(function(a,e,f,g,b,c,d){a.GoogleAnalyticsObject=b;a[b]=a[b]||function(){(a[b].q=a[b].q||[]).push(arguments)};a[b].l=1*new Date;c=e.createElement(f);d=e.getElementsByTagName(f)[0];c.async=1;c.src=g;d.parentNode.insertBefore(c,d)})(window,document,"script","https://www.google-analytics.com/analytics.js","ga");ga("create","UA-732153-7","auto",{allowLinker:!0,siteSpeedSampleRate:10});ga("set","transport","beacon");ga("set","anonymizeIp",!0);ga("require","linker"); ga("linker:autoLink","askapache.com askapache.net htaccess.io htaccesselite.com askapache.info htaccess.guru".split(" "),!0);ga("send","pageview"); CLASS="ARTICLE" BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#840084" ALINK="#0000FF" >

Introduction to Securing Data in Transit

Jennifer Vesperman

jenn@linuxchix.org

2002-02-24

Revision History
Revision 0.12002-02-17Revised by: MEG
Converted from text file. Modified wording.
Revision 0.22002-02-23Revised by: MEG
Incorporated Jenn's comments.
Revision 0.32002-02-24Revised by: MEG
Conforming to LDP standards. Added abstract.

Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Overview
2. Authentication
3. Encryption
3.1. Private key encryption
3.2. Public Key encryption
3.3. Limitations of encryption
4. Secure HTTP
5. Secure Email
6. Secure Shell
7. Other Data Transfer
8. Final words