Public key

Home/Tag:Public key

Data Encryption

2020-09-24T06:39:21+00:00Categories: Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Data encryption translates data into another form, or code, so that only people with access to a decryption key or password can read it. Today, encryption is widely used on the internal networks and internet to ensure the sanctity of user information (such as payment data or personal information) that's sent between a browser and a [...]

Cryptography- Part 2

2020-07-15T13:29:55+00:00Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

Cryptography- Part 2 Asymmetric Cryptography / Public Key Cryptography In this method, two keys are used: Private Key: This key is only known by the owner itself. Public key: This key is issued by using Public Key Infrastructure (PKI) where a trusted Certification Authority (CA) certifies the ownership of key pairs. Only the private [...]

Go to Top