Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Law Library Homepage About the Law Library Research Services Faculty Students Help Ask a Law Librarian Law Library Home page UNC Libraries Law Library Blog Twitter

Security Tools: Encryption and Security Certificates

First in a series on security tools, this guide discusses encryption, security certificates, and Public Key Infrastructure

What Is in This Guide?

Signet ring  CC-By-2.0

Photo credit

Signet rings are used to authenticate documents by pressing the ring's face into melted wax. The document is then "under seal."

Encryption and Security Certificates

This guide discusses encryption, which is the intended transformation of information into apparently illegible form, and security certificates. These are key components of Public Key Infrastructure (PKI), which underlies the secure transmission and storage of data in digital form. These tools allow secure, confidential sharing of information, and authentication of information as to provenance and content.