Jump to user comments
in order to prevent any but the intended recipient from
reading that data.
Schematically, there are two classes of encryption primitives:
are generally used complementarily.
Public-key encryption algorithms include
RSA;
The
Unix command
crypt performs a weak form of encryption.
(2003-04-12)