First page Back Continue Last page Graphics
Location of Encryption Devices
End-to-end Encryption
- The encryption process is carried out at the two end systems
- Encrypted data are transmitted unaltered across the network to the destination, which shares a key with the source to decrypt the data
- Packet headers cannot be secured