11 Apr

RSA – This stands for Rivest, Shamir, and Adelman, the inventors of the technique. The RSA algorithm is based on the fact that there is no efficient way to factor very large numbers. Cracking an RSA key, therefore, requires an extraordinary amount of computer processing power and time.


PGP –  Pretty Good Privacy is one of the most common ways to protect messages on the internet because it is effective, easy to use, and free. PGP is based on the public key method, which uses two keys — one is a public key that you disseminate to anyone from whom you want to receive a message. The other is a private key that you use to decrypt messages that you receive.


Cipher – Data that has been encrypted. Cipher text is unreadable until it has been decrypted with a key.


Symmetric-key Encryption – A type of encryption where the same key is used to encrypt and decrypt the message


Public-key Encryption – A system that uses two keys: a public key known to everyone and a private or secret key known only to the recipient of the message. When John wants to send a secure message to Jane, he uses Jane’s public key to encrypt the message. Jane then uses her private key to decrypt it.


Digital Certificate – An attachment to an electronic message used for security purposes. The most common use of a digital certificate is to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply.


SSL –  Secure Sockets Layer, a protocol for transmitting private documents via the Internet.


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

%d bloggers like this: