Do you ever remember as a kid speaking in what we referred to as pig Latin? Whether it was an inappropriate name or not, it served as a useful, and in many cases, fun way to encrypt messages we may not have wanted a younger brother or sister to understand. With vast amounts of personal and financial information passing over the Internet on a daily basis, we have a similar need to keep our communication process secret. As a result, many systems and programs have been developed to meet our data transfer needs. . .
This article addresses: Explaining the difference between symmetric key encryption and public key encryption. Which dimensions of e-commerce security does encryption address?