Encryption Gets Better, but Remains Imperfect

    Date19 Jun 2000
    CategoryCryptography
    3497
    Posted ByAnthony Pell
    "There is some outstanding technology available, and in publicly available algorithms," Bauer told Newsbytes after his speech. "The problem isn't that there's no good cryptographic technology available. The problem is that it's fiendishly difficult to implement the technology in a secure . . . "There is some outstanding technology available, and in publicly available algorithms," Bauer told Newsbytes after his speech. "The problem isn't that there's no good cryptographic technology available. The problem is that it's fiendishly difficult to implement the technology in a secure fashion."

    Public key infrastructure (PKI) has promise as a secure technology too, he says. It involves the use of a coded key that an end user can hand out to the public, much as a phone number is given out. Others can use that key to encrypt secure documents and send them back to be opened by the end user. But they cannot be used without PKI's second component, a private key that only they can know or access.."

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"4","type":"x","order":"1","pct":80,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":20,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.