Alibaba Cloud Developer
Aug 30, 2018 · Information Security
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures
This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.
CertificateMacasymmetric key
0 likes · 14 min read
