VIEWS: 11 PAGES: 1 POSTED ON: 5/1/2011
Encryption and Public Key Infrastructure Encryption is the process of transforming plain text or data into cipher text that can not be read by anyone other than sender and intended receiver Secure Sockets Layer (SSL) and it successor Transport Layer Security (TLS) enable server to manager encryption and decryption activity to secure a web. Secure Hypertext Transfer Protocol (S-HTTP) is another protocol used encryption data flowing over the internet, limited to individual message. Symantec Key , the sender receiver establish a secure Internet session by creating a single encryption key and sending it to the receiver so both the sender and receiver share a same key Encryption Key is measured by its bit length. Typical key be 128 bits long Public key encryption, uses to 2 key. 1st key share (or public) and 2nd totally private. Key are mathematically related, data encryption with one key can be decryption using only to the other key. Public key must be kept secret A digital signature is an encryption message that only the sender using private key can centre. Digital certificated are data files used establish the identity of user and electronic assets for protection of online transactions. Public Key infrastructure (PKI), use public key cryptography working with a certificate authority is widely used in e commerce.
Pages to are hidden for
"Encryption and Public Key Infrastructure"Please download to view full document