I am trying to teach myself about security re encryption, digital signatures, and 
certificates, etc.  I understand the explanations of how these work when the books say 
e.g."you ask for the recipients public key, and use that to encrypt...." etc. etc.  
Here is my question, how do you actually implement "asking for a public key" and 
"using it to encrypt" ? Does one buy a software package that does all this for you??  
I am stuck on how the actual implementations of these procedures are carried out.  
TIA..
--susan
Archives: http://www.mail-archive.com/[email protected]/
Unsubscribe: http://www.houseoffusion.com/index.cfm?sidebar=lists

Reply via email to