I am trying to teach myself about security re encryption, digital signatures, and
certificates, etc. I understand the explanations of how these work when the books say
e.g."you ask for the recipients public key, and use that to encrypt...." etc. etc.
Here is my question, how do you actually implement "asking for a public key" and
"using it to encrypt" ? Does one buy a software package that does all this for you??
I am stuck on how the actual implementations of these procedures are carried out.
TIA..
--susan
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists