one by applying mathematical algorithms that require a “key” to unlock, or decrypt, the original data. Algorithms that use the same key to encrypt and decrypt data are known as “symmetric” encryption algorithms. Algorithms that use different keys to encrypt and decrypt data are known as “asymmetric” or “public-key” encryption algorithms. Encrypted data comes in two forms 40-bit and 128-bit. 40-bit encryption uses a 40 bits of space to encrypt data and 128 bits of space for the 128-bit form. The process of verifying the sender’s identity is known as “authentication”. Authentication can be performed with a user name and password, or with a piece of information known as a “digital certificate”. A digital certificate contains encryption parameters, which can be used to uniquely identify a user or a host system. Verifying that an external party has not modified data is known as “integrity checking”. Integrity checking is done by applying a mathematical algorithm, known as a “hash”, to data before it’s sent and computing the same hash when the data is received. If the two hashes map to the same result, then the data hasn’t been modified. How do these areas affect client/server transaction? Client/server transaction deals with the everyday transactions that people engage in on the Internet. With each transaction, personal information is sent from client to vendor. The information has a tendency to be sensitive in nature and not something shared with anyone except the vendor. Such information may include social security numbers, credit card numbers, and possibly information for monthly bills (account numbers and balances specifically). Businesses have to save-guard their customers in order for their customers to feel secure in buying products and services from them. Businesses understand this importance. Some businesse...