First page Back Continue Last page Graphics
Encryption Methods
The essential technology underlying virtually all automated network and computer security applications is cryptography
Two fundamental approaches are in use:
- Conventional Encryption, also known as symmetric encryption
- Public-key Encryption, also known as asymmetric encryption