Hash functions calculate a fixed length binary digest of a document. Read on to see what additional requirements turn an ordinary hash function into a cryptographic hash function and what use cases require the use of cryptographic hash functions.
Certificates are containers for asymmetric encryption keys that can be used to establish a chain of trust between communicating parties. Read on to see how this works in practice.
SQL Server groups all pages that belong to a single partition of a single index or heap into logical units. These units are called allocation units. Read on to learn about the different types of allocation units and discover how to identify the allocation units belonging to a table.
Asymmetric key encryption (aka public-key encryption) works with two separate keys, a public key to encrypt and a private key to decrypt. Read on to see the advantages and disadvantages of this type of encryption.
A symmetric key encryption algorithm is a cryptographic algorithm the uses the same secret key for the encryption and the decryption step. Common examples include DES, RC4 and AES of which only AES can be recommended for use.