Secure Communication

Problems:

It is possible for a third party to interfere with communications in the following ways:

Normally, the network traffic is not monitored by the cooperating computers or networks which compose the Internet. However, many sensitive personal and business communications over the Internet require precautions that address potential security threats. Well-established standards and practices known as public- key cryptography make it relatively easy to take such precautions.

Public-key cryptography

Public-key cryptography facilitates the following tasks: