2. Security Encryption Systems
Credit-card information
Social Security numbers
Private correspondence
Personal details
Sensitive company information
Bank-account information
3. Symmetric Key
Symmetric-key encryption
the Data Encryption Standard (DES)
the Advanced Encryption Standard (AES)
4. Public Key Encryption
Asymmetric-key
Pretty Good Privacy (PGP)
Digital Certificates
Certificate Authority
5. SSL and TLS
Secure Sockets Layer
Transport Layer Security
6. Hashing Algorithm
Hash Value
Algorithms
Sahara Desert
Input number
Hashing algorithm
Hash value
10,667
Input # x 143
1,525,381
7. Authentication
Password
Pass cards
Digital signatures
Biometrics
Fingerprint scan
Retina scan
Face scan
Voice identification
8. Checksum and CRC
Checksum
If the sum of the other bytes in the packet is 255 or less, than the
checksum contains that exact value
If the sum of the other bytes is more than 255, then the checksum is
the remainder of the total value after it has been divided by 256
Cyclic Redundancy Check (CRC)