Tools and Techniques of Encryption

29/5/96


Click here to start


Table of Contents

Tools and Techniques of Encryption

Introduction

Agenda

Importance of encryption

Applications for encryption

Encryption in the office

Principles and protocols

What is public key encryption?

Authentication without encryption

Public Keys

PGP - Pretty Good Privacy

Other encryption standards

Other encryption standards

Using encryption tools

Dangers and limitations

Dangers and limitations

Summary

Author: Jeremy Malcolm

Email: Jeremy@ilaw.com.au

Home Page: http://www.ilaw.com.au

Download presentation source