Introduction to Electronic Certificates - Part 1

by Adrian Stolarski
Oct. 7, 2017 0 comments INFOSEC Institute Encryption & Authentication

As we all know, our e-mail messages can be viewed, modified and censored in thousands of places that are located between the sender and the receiver, and this practice is strictly used by some of our employers. It must be remembered that no longer can a very small amount of knowledge and use of communal software lead to almost complete protection of our e-mails. Hiding the message before unauthorized persons are able to read and confirming the authenticity are already provided by even the most basic algorithms used to generate a digital signature and encryption of virtually any messages