ABSTRACT

For this we will look at the usage of hashing to finger-print data and then how Bob’s private key can be used to authenticate himself. Finally, we will look at the way that a public key can be distributed, using digital certificates, which can carry encryption key. This chapter will show the importance of authentication and assurance, along with confidentiality (Figure 4.1) and the usage of biometrics.