Scheduled Maintenance Notice: H2O will be undergoing maintenance on Weds, July 30. Some features may be temporarily unavailable during this period. Thank you for your understanding.

Main Content

Cybersecurity 101: Three-Part Introductory Section

1.2.4.a Encryption (public and private keys, hash functions)

Public key cryptography enables encryption and decryption of data transferred between two parties, the authentication of data’s origin, and indication of data tampering.