This article is the third in this series. This series aims to give the reader a bottoms-up introduction to the basics of e-security. The goal of this article is to introduce the reader to the available password based encryption standards. The limitations of password based encryption standards are also discussed.

For more information on Internet security, visit RSA Security’s Web site.