Differences between version 8 and revision by previous author of PublicKeyAuthentication.
Other diffs: Previous Major Revision, Previous Revision, or view the Annotated Edit History
Newer page: | version 8 | Last edited on Wednesday, March 24, 2004 8:52:49 am | by AristotlePagaltzis | Revert |
Older page: | version 6 | Last edited on Wednesday, November 5, 2003 10:56:56 pm | by CraigBox | Revert |
@@ -10,5 +10,5 @@
The maths involved is still complicated, [CPU] intensive, and not as secure as conventional cryptography. In practice, therefore, PublicKeyAuthentication is used to transfer the key for a conventional symmetric cryptographic algorithm used to encrypt the actual message sent.
----
-Part of CategorySecurity
+Part of CategoryCryptography