ABSTRACT

Crucial to the configuration and discussion of network security is an understanding of cryptographic terms. This vocabulary is essential when evaluating any type of encryption technology, be it files encryption or the encryption of packets in transit (as through a VPN). While we will not include enough detail on the algorithms to write your own implementations, we will discuss the most important terms and algorithms to allow you to better compare countermeasures.