Private and public keys
Algorithms can use two types of keys: private and
public. Private key algorithms use one key to encrypt and decrypt information. Privacy uses private keys. It is up to you to ensure that• you trust the people to whom you tell a key or
export an alias, and• no one else has access to your aliases and keys.
Public key algorithms
use two keys, one to encrypt information and the other to decrypt it. The encrypt key can be published because you have your own secret key to decrypt information.
If the above options do not provide enough security for you, download Access manager for Windows. Access manager provides much more security than standard ways in Windows. |