-
The Public Key Infrastructure (PKI) uses the same algorithm to create two keys: the public key and the private key. The certification authority issues and manages the security certificate and public key for message encryption. The private key is only provided to the requester and is not shared with anyone. On the contrary, the public key is placed in a directory that can be searched by all parties. Therefore, the sender who wants to transmit encrypted messages searches the directory of digital certificates to find the public key of the receiver, and uses the public key to encrypt the information. When the receiver receives the encrypted message, it decrypts it with the private key. -
PGP (Pretty Good Privacy) is a mail encryption software based on RSA public key encryption system. It can be used to encrypt the message to prevent unauthorized persons from reading it. It can also add digital signatures to the message so that the recipient can confirm the sender of the message and be sure that the message has not been tampered with. It can provide a secure way of communication, and does not need any confidential channel to transfer the key in advance. -
Virtual Private Network (VPN) is a method of using public telecommunications infrastructure to provide secure communication between remote personal or client computers and enterprise networks. VPN works through shared public infrastructure, but maintains privacy through security procedures and tunnel protocols. These protocols send data through a tunnel, encrypt the data at the sending end, decrypt it at the receiving end, and only correctly encrypted data can enter the tunnel.
+86 10-60259772