Introduction to cryptography, Part 5, Practical applications

From the developerWorks archives

Murdoch Mactaggart

Date archived: May 13, 2019 | First published: March 01, 2001

Cryptography may be an interesting intellectual exercise, but its ultimate value lies in being deployed to facilitate secure communication of known integrity or to protect or control access in various ways. Different methods can be combined, as is the case with the widely used program PGP. Digital signatures, despite some concerns about their use, can be a useful means of confirming identity. Covert methods, specifically steganography, may sometimes be useful. Increasing use is being made of smartcards and of biometric techniques both as replacements for and in conjunction with conventional cryptosystems. Meanwhile, the growth in electronic transmission of value is a very important area so far as the deployment of cryptography is concerned.

This content is no longer being updated or maintained. The full article is provided "as is" in a PDF file. Given the rapid evolution of technology, some content, steps, or illustrations may have changed.



static.content.url=http://www.ibm.com/developerworks/js/artrating/
SITE_ID=1
Zone=Tivoli (service management), Tivoli, Security
ArticleID=15019
ArticleTitle=Introduction to cryptography, Part 5: Practical applications
publish-date=03012001