Advertisement

How Does Secure Email Work?

  • Hilarie OrmanEmail author
Chapter
Part of the SpringerBriefs in Computer Science book series (BRIEFSCOMPUTER)

Abstract

There are several components to the cryptography for secure email. The most fundamental concept is that public/private key pairs that enable asymmetric cryptography. The asymmetric methods protect the keys for the faster, more efficient symmetric key methods. By balancing the amount of material protected by each kind of key, implementations of secure email can be both fast and secure.

Keywords

Hash Function Elliptic Curve Certificate Authority Encrypt Message Certificate Chain 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Copyright information

© The Author(s) 2015

Authors and Affiliations

  1. 1.Purple Streak, Inc.Woodland HillsUSA

Personalised recommendations