SOME OF THE MAIN TOPICS IN THIS CHAPTER ARE
This chapter gives you a quick overview of the two basic encryption techniques in use today, and shows how they can be applied to networks to help keep programs and data secure and to prevent unauthorized persons from gaining access. These encryption techniques are known generally as single-key encryption and public-key encryption. Alternatively, they often are referred to as symmetric encryption (single key) and asymmetric encryption (public key). |