August 2000
Intermediate to advanced
800 pages
21h 5m
English
CryptoAPI provides all the necessary functionality to ensure authentication, privacy, and integrity in network communication.
Authentication in CryptoAPI is ensured by digital certificates, which are the digital equivalent of photo IDs. A computer program, user, or other entity uses the certificate to prove its authenticity. Authentication algorithms such as Kerberos are also available to developers through CryptoAPI.
Integrity comes from digital signatures and hashes. A hash ensures that nobody has changed the message or data. A digital signature protects the hash and demonstrates the identity of the user or program that signed the data.
Providing privacy for communications and data is possible with the use of encryption. ...