Click to return to the Security     
Web Workshop  |  Security & Cryptography

The Core Technology: Public-Key Cryptography


Microsoft Corporation

September 10, 1996

Cryptography provides a set of techniques for encoding data and messages such that the data and messages can be stored and transmitted securely. This section introduces the basic terminology of cryptography and explains some of the common methods used.

Cryptography allows a series of operations or actions on data. The two fundamental operations are encryption (with decryption as its inverse) and signing (with verification of signature as its matching operation). Encryption is analogous to enclosing data in an opaque envelope; decryption is analogous to removing it from the envelope. Signature is similar to physically signing a document, and initialing each section to show that no portion of the document has changed. Verification of signature is roughly equivalent to matching the signature to a "signature on file" card, and verifying that no portion of the document has changed. Certificates are signed documents which match public keys to other information.

Here's a brief description of the core technology:

NextNext page



Back to topBack to top

Did you find this material useful? Gripes? Compliments? Suggestions for other articles? Write us!

© 1999 Microsoft Corporation. All rights reserved. Terms of use.