home *** CD-ROM | disk | FTP | other *** search
/ Developer Source 18 / Developer Source Volume 18 (I-MODE Publications, Inc.)(2000).iso / ntvar / aug97 / kessf101.gif < prev    next >
Graphics Interchange Format  |  1998-02-10  |  30KB  |  407x244  |  4-bit (16 colors)
Labels: text | screenshot | font | number | document | line
OCR: THREE OF A KIND Figure 1: Three different types of cryptographic algoritlans can be used to protect data. Scenario A depicts secret key (symmetric) cryptography, which uses a single key for both encryption and decryption. Scenario B illustrates public key (asymaneric) er yprography, which uses tino keys -- one for encryption and the other for decryption. Scenari C depicts a bash function, which has no key because the plaintext is not recoverable from the ciphertext.