"There is some outstanding technology available, and in publicly available algorithms," Bauer told Newsbytes after his speech. "The problem isn't that there's no good cryptographic technology available. The problem is that it's fiendishly difficult to implement the technology in a secure . . .
"There is some outstanding technology available, and in publicly available algorithms," Bauer told Newsbytes after his speech. "The problem isn't that there's no good cryptographic technology available. The problem is that it's fiendishly difficult to implement the technology in a secure fashion."

Public key infrastructure (PKI) has promise as a secure technology too, he says. It involves the use of a coded key that an end user can hand out to the public, much as a phone number is given out. Others can use that key to encrypt secure documents and send them back to be opened by the end user. But they cannot be used without PKI's second component, a private key that only they can know or access.."

The link for this article located at Computer User is no longer available.