Creating a Certificate Request File
Stronger certificate encryption is less likely to be compromised or impersonated
Strength of the certificate does not determine the encryption strength of the session key
Previous slide
Next slide
Back to first slide
View graphic version