O'Reilly logo

PHP 5 Unleashed by John Coggeshall

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 12. Data Encryption

Unless you've been living under a rock for the past 10 years, you've probably heard the term cryptography (or data encryption) at least once. You've probably also got a pretty good notion of what it is: taking some piece of information and jumbling it up so that no one can read it except the people who should be able to. What you may not know is how it works and, more importantly, how you can use it in your own programs.

This chapter will cover two basic categories of encryption: shared secret and public key. Each form of encryption shares the same basic concepts: Party A uses a key and/or algorithm to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required