1 Authentication & Encryption CPSC 328 Spring 2009 The Web & Security WWW & Security don’t really go hand-in-hand Anonymity abounds Eavesdropping abounds
Authentication, Encryption, Digital Payments, and Digital Money. Chapter 5 Slide 2 ... Asymmetric Key Encryption • Most common Based on RSA Data Security Algorithm. • Based on public keys. • Composed by two keys, public and private.