Encryption – Introduction to E Business | BBA Notes


The most common method of securing transmissions over the internet is encryption. Public key and secret key encryption are the two main methods of encryption. In secret-key encryption, the parties share an encrypted key number that is known only to them. Encrypting and decrypting a message use the same key. Using public-key encryption, the encrypted key numbers used by the sender and receiver are different.

Two keys are used in this method, sometimes called asymmetric cryptography, to encrypt and decrypt a message. Using the keys in combination allows the material to be read only when the keys are related by numerical code. The keys are both public and private for each user. A key pair cannot be transformed into another. As a result, any user is free to publish their public key and allow others to communicate with them using that public key to encrypt their messages. If the user ensures that the private key is not disclosed to anyone, this level of security is maintained.

Encrypting e-mail messages using public-key encryption is based on Pretty Good Privacy (PGP) software, which can be downloaded for free or purchased. Secure Sockets Layer (SSL) was developed by Netscape and widely distributed as a method of securing communication over HTTP. For authenticating transactions, SSL-enabled servers use digital certificates. The majority of B2C transactions are secured by SSL.

Similarly, You may Also Like: