Encryption
Protect data from prying
Digitally sign data
proof of origin
proof of integrity
Source is plaintext
After encryption, have ciphertext
Slide 49
©Copyright 1997
Jan Newmarch