CHAPTER 47. Encryption Technology

SOME OF THE MAIN TOPICS IN THIS CHAPTER ARE

Computers and Privacy 908

What Is Encryption? 908

Digital Certificates 912

Pretty Good Privacy (PGP) 913

This chapter gives you a quick overview of the two basic encryption techniques in use today, and shows how they can be applied to networks to help keep programs and data secure and to prevent unauthorized persons from gaining access. These encryption techniques are known generally as single-key encryption and public-key encryption. Alternatively, they often are referred to as symmetric encryption (single key) and asymmetric encryption (public key).

Computers and Privacy

When computers were standalone systems that were easily controlled by a central administrative ...

Get Upgrading and Repairing Networks, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.