Cryptography in Action

You will encounter cryptography in many forms throughout this book. It is applied to many different technologies and situations and, as such, is something you need to have a firm grasp of. Some examples of applied cryptography are: Public key infrastructure (PKI)  Digital certificates  Authentication  E-commerce  RSA  MD-5 Secure Hash Algorithm (SHA)  Secure Sockets Layer … Read more