Next:
3.3.1 What is cryptography?
Up:
3 How Can Security
Previous:
3.2.5 Comments
3.3 Data Security: Cryptography
3.3.1 What is cryptography?
3.3.2 What is a key?
3.3.3 What is public key cryptography (PKC)?
3.3.4 How does someone obtain a pair of keys?
3.3.5 How is information integrity assured?
3.3.6 What about authenticity?
3.3.7 Is the certificate trustworthy?
3.3.8 What about non-repudiatability of origin?
3.3.9 What about non-repudiatability of receipt?
Denis Arnaud
12/19/1997