Abstract
Why would we want to use encryption? The answer is surely obvious: while some of the information stored on a computer may be public, there is also plenty that is not and should not be public: passwords and other access information, personal information of various sorts, sensitive company data, and so forth. Such information needs to be available; that is why it’s on the computer in the first place. But that information needs to be hidden somehow, made inaccessible to any third party who, by chance or malicious design, happens to stumble onto it. In this chapter, we’ll be discussing how and why to hide information, whether on disk or in a database. We will look at how to accomplish both symmetric and asymmetric encryption using PHP and the most common algorithms.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2010 Chris Snyder, Thomas Myer, and Michael Southwell
About this chapter
Cite this chapter
Snyder, C., Myer, T., Southwell, M. (2010). Using Encryption. In: Pro PHP Security. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-3319-0_15
Download citation
DOI: https://doi.org/10.1007/978-1-4302-3319-0_15
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-3318-3
Online ISBN: 978-1-4302-3319-0
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)