O'Reilly logo

Privacy Defended: Protecting Yourself Online by Chris Weber, William Chan, Gary Bahadur

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Encryption Systems

Most encryption systems consist of a lock and key. The lock is the encryption of your files, or data in transit, and the key is some password, ID, or certificate that only you possess. The security of the key is important and typically is left up to you, the user, to protect.

That brings us to the question of what makes encryption strong. It might seem that the algorithm or cipher determines the strength of the encryption system. This is partially true because a good algorithm is important. However, the strength of the encryption system should not depend on the secrecy of its algorithm. In fact, a strong algorithm is typically one that is widely known, and has been widely studied and attacked by knowledgeable cryptanalysts. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required