Chapter 5 What about encryption? How a public key infrastructure is used for encryption

DOI: 10.1201/9781003360674-5

Data encryption has been around for a long time. There is some evidence that the ancient Egyptians used a system of symbol replacement, much like we use character replacement today. In which case, it is also likely that the Sumerians, Hittites and Harappans, among others, may equally have been doing something along these lines. By the time we get to the Romans, the concept was well established. Since then, there have been a wealth of different ideas, from complicated character or whole word replacement, to phrase books and look-up tables where completely different phrases would be used to convey the meaning of a given message. ...

Get PKI Implementation and Infrastructures now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.