EasyManua.ls Logo

ASCOM IPBS - Page 31

ASCOM IPBS
178 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
TD 92579EN
15 February 2012 / Ver. H
Installation and Operation Manual
IP-DECT Base Station & IP-DECT Gateway (software version 5.0.x)
23
Cryptography tasks can be divided into the two general categories Encryption and
Authentication.
Encryption
Encryption is the scrambling of information so that the original message cannot be
determined by unauthorized recipients by applying an encryption algoritm to the message
plaintext producing ciphertext (appearently random bits). A decryption algoritm, if given
the correct key, converts the ciphertext back into plaintext. Public key algoritms use paired
keys, one for encryption and another for decryption.
Authentication
Authentication is the verification of a message’s sender. This requires the message to be
protected so it cannot be altered, usually by generating a digital signature formed by a
hash of the message. Only the correct key can generate a valid signature.

Table of Contents

Related product manuals