Encryption

There are several encryption technologies that Elsolutions may select that remove the requirement to transmit credentials and data in the clear.

Public Key Infrastructure

Public key infrastructure (PKI) uses a key pair. One key is a public key known to anybody. The other key is a private, secret key known only to one party. If we encrypt with one key of the pair, it may be decrypted only by its sibling key. This clever, albeit slow, technology is an enabler for nonreputable mutual authentication and digital signing of records. PKI is a building block for the Secure Sockets Layer (SSL), secure shell, and Pretty Good Privacy (PGP) security technologies.

PGP

PGP uses PKI to encrypt data without requiring a shared secret to be transmitted ...

Get Linux® and Windows® Interoperability Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.