Introduction to cryptography, Part 4, Cryptography on the Internet

From the developerWorks archives

Freelance Writer

Date archived: May 14, 2019 | First published: March 01, 2001

The Internet introduces a whole new raft of vulnerabilities. Organizations or individuals with whom you're communicating may be unknown or may be masquerading as someone else. Without getting paranoid about such issues, it's necessary to take suitable precautions against loss occasioned in various ways, whether by diversion of funds, the consequences of faulty authentication, loss of confidential information, repudiation of contracts and so on. Cryptography is central to managing this new level of risk, and this feature introduces some of the protocols and related mechanisms that are of particular relevance to Internet activity, including e-mail.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some content, steps, or illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Tivoli (service management), Tivoli, Security
ArticleID=15016
ArticleTitle=Introduction to cryptography, Part 4: Cryptography on the Internet
publish-date=03012001