11.07.2015 Views

Summary

Summary

Summary

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 16: Advanced Security 9intercept and change messages. Figure 16-4 illustrates the hash-encoding process. Thenames of the most popular hashing algorithms are SHA and MD5.Figure 16-4Hash EncodingSymmetric EncryptionSymmetric encryption requires both sides of an encrypted conversation to use an encryptionkey to be able to encode and decode the data. The sender and receiver must use identicalkeys. Figure 16-5 illustrates the symmetric encryption process.Figure 16-5Symmetric Encryption

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!