Data on transmission and data at storage, in both situation data is at risk zone. So, data transmission and storage must to be encrypted. Order processing, payment information, communication, and storage all are very sensitive and need to protected with encryption processing.
In this system Asymmetric encryption will be best which has SSL protocol and the most used RSA algorithm is embedded in this protocol. Secure Socket Layer (SSL) protocol will be used to secure connections between network application clients and servers. The company runs a LAN with access to the Internet. So, SSL is required. RSA algorithm derives its security from the computational difficulty of factoring large integers that are the product of two large prime numbers. RSA algorithm keys are typically 1024 or 2048 bits long (Rouse, 2016).
Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
It is useful for all who want to know about background of technology..
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Congratulations @itstream! You received a personal award!
Click here to view your Board
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness and get one more award and increased upvotes!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit
Congratulations @itstream! You received a personal award!
You can view your badges on your Steem Board and compare to others on the Steem Ranking
Do not miss the last post from @steemitboard:
Vote for @Steemitboard as a witness to get one more award and increased upvotes!
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit