5.3. Cryptography

Cryptography is the name given to techniques that allow information to be modified so that it can pass through public view while enroute to a recipient, but cannot be returned to its original form by the public. There are two distinct forms of cryptography in common use: symmetric and asymmetric, and while there's quite a lot in common between the two forms, they also have significant differences.

In symmetric cryptography, the sender and legitimate receiver of information share the secret of how information sent between them is disguised. On closer consideration, this disguising mechanism typically has two parts: an algorithm that defines what mathematical operations are to be performed to encrypt the data, and also a key. ...

Get Sun Certified Enterprise Architect for J2EE™ Technology Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.