Documents
Resources
Learning Center
Upload
Plans & pricing Sign in
Sign Out

Encryption and Public Key Infrastructure

VIEWS: 11 PAGES: 1

  • pg 1
									Encryption and Public Key Infrastructure



   Encryption is the process of transforming plain text or data into cipher text that can not
    be read by anyone other than sender and intended receiver
   Secure Sockets Layer (SSL) and it successor Transport Layer Security (TLS) enable server
    to manager encryption and decryption activity to secure a web.
   Secure Hypertext Transfer Protocol (S-HTTP) is another protocol used encryption data
    flowing over the internet, limited to individual message.
   Symantec Key , the sender receiver establish a secure Internet session by creating a
    single encryption key and sending it to the receiver so both the sender and receiver
    share a same key
   Encryption Key is measured by its bit length.
   Typical key be 128 bits long
   Public key encryption, uses to 2 key. 1st key share (or public) and 2nd totally private.
   Key are mathematically related, data encryption with one key can be decryption using
    only to the other key.
   Public key must be kept secret
   A digital signature is an encryption message that only the sender using private key can
    centre.
   Digital certificated are data files used establish the identity of user and electronic assets
    for protection of online transactions.
   Public Key infrastructure (PKI), use public key cryptography working with a certificate
    authority is widely used in e commerce.

								
To top