Uses a mathematical
function to create a
numeric value that is
unique to the data
If even one character in the message has been changed,
the computer that receives the message will know it
by decoding it (creating the message digest)
Symmetric Encryption
both computers use the same encryption key
Asymmetric Encryption
it requires 2 keys
a public key
Annotations:
everybody has it
a private key
Annotations:
only the organisation that receives the message has it