Zusammenfassung der Ressource
Encryption (coding data to make
them more secure)
- Hash Encoding
- Checks that messages are not corrupted
- Uses a mathematical
function to create a
numeric value that is
unique to the data
- If even one character in the message has been changed,
the computer that receives the message will know it
by decoding it (creating the message digest)
- Symmetric Encryption
- both computers use the same encryption key
- Asymmetric Encryption
- it requires 2 keys
- a public key
Anmerkungen:
- a private key
Anmerkungen:
- only the organisation that receives the message has it