• United States



by CSO Contributor


Mar 19, 20031 min
CSO and CISOData and Information Security

Any company that wants secure communications among workers or between itself and customers has to pay attention to encryption schemes. The familiar Morse code is an example of an encryption scheme that uses symmetric algorithms. It’s symmetric because both parties use the same process for coding and decoding the communications. The best encryption systems are asymmetric. There are two keys, one private and one public. The keys are compatible, although independent of each other in their own coding, so many users can have the same public key without violating the security of the private key.