Site home page Get alerts when Linktionary is updated Book updates and addendums Get info about the Encyclopedia of Networking and Telecommunicatons, 3rd edition (2001) Download the electronic version of the Encyclopedia of Networking, 2nd edition (1996). It's free! Contribute to this site Electronic licensing info
|
Key Encryption Methods Related Entries Web Links New/Updated Information Note: Many topics at this site are reduced versions of the text in "The Encyclopedia of Networking and Telecommunications." Search results will not be as extensive as a search of the book's CD-ROM. Key encryption technologies are used to encrypt and decrypt data. A key is a value that is used with cryptographic algorithms to encrypt some input (called plaintext). The output is called ciphertext. Given the same input and the same algorithm, a different key will produce different ciphertext. See "Cryptography," "Public-Key Cryptography," and "PKI (Public-Key Infrastructure)." Copyright (c) 2001 Tom Sheldon and Big Sur Multimedia. |