Security

Previous Topic Next Topic

Encryption

Various cryptographic algorithms provide tamper detection and encryption; SSL and TLS can use protocols such as RC2, RC4, DES, 3DES, SkipJack and IDEA for encryption, and MD5 or SHA1 for tamper detection. For more information about these encryption protocols, see the books mentioned in “Additional Resources” at the end of this section. For more information about SSL and TLS, see http://www.ietf.org/ids.by.wg/tls.html.


© 1997-1999 Microsoft Corporation. All rights reserved.