home *** CD-ROM | disk | FTP | other *** search
/ Alles Voor Internet / Tout Pour Internet / alles voor internet.iso / MacInternet™ / Archive-tools / Privacy & Encryption / Privacy & Encryption.rsrc / PICT_16.png < prev    next >
Portable Network Graphic  |  1993-05-04  |  96KB  |  816x1056  |  8-bit (255 colors)
Labels: book | bulletin board | poster | reckoner | sky
OCR: Copyright Paul D. Bain, 1993 ciphertext Computer encryption has become more common as encry yption keys have been increasingly inserted into the microchips, circuit boards and software used by all computers The two methods of encrypting computer information are private -key cryptog raphy and public -key cryptography Methods of Encryption Private -Key Cryptog raphy and DES Private-key cryptography is product of traditional cryptog raphy and is based on the sender and receiver of information using the same secret key 56 In private -key cryptog raphy the sender uses the secret key to encrypt plaintext into ciphertext and the receiver uses the same secret key decrypt the ciphertext into plaintext. Therefore, both the sender and receiver must know the encryption key and keep secret for effectiv ...