Appendix G. Overview of public key cryptography
Overview
This appendix provides an overview of public key cryptographic techniques, and how they are applied in the SSL (secure sockets layer) communications protocol. It discusses encryption and decryption, secure hash algorithms, digital signatures, and certificates.
Get Applied Enterprise JavaBeans™ Technology now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.