-->

Go

Link encryption (sometimes referred to as link layer or link layer encryption) is the data protection process to encrypt information at the data link level because it transmits between two points within a network. On the host server, plain text, which is encrypted when the host is skipped, has been decrypted on the following link (which can be a host or relay point), and then encrypted before continuing on the following link . Each link can use a different key for data encryption or even a different algorithm. The process is repeated until the data recipient is accessed.

Link encryption occurs in the lowest protocol layers (layers 1 and 2 in the OSI model). Because the process keeps the message in transit, the encryption of the link is very useful in situations where there is no guarantee of transmission lines. However, because the message has been decrypted on each host in the transmission path, the vulnerability can occur in a link when the message should be transmitted between hosts that are not secure.

Link encryption has been used successfully within organizations, including the military, where the security of each link can be guaranteed. It is not possible on the Internet, because the intermediate links are not accessible or safe.


Link encryption has been used successfully within organizations, including the military, where the security of each link can be guaranteed. It is not possible on the Internet, because the intermediate links are not accessible or safe.

Link encryption occurs in the lowest protocol layers (layers 1 and 2 in the OSI model). Because the process keeps the message in transit, the encryption of the link is very useful in situations where there is no guarantee of transmission lines. However, because the message has been decrypted on each host in the transmission path, the vulnerability can occur in a link when the message should be transmitted between hosts that are not secure.

Link encryption (sometimes referred to as link layer or link layer encryption) is the data protection process to encrypt information at the data link level because it transmits between two points within a network. On the host server, plain text, which is encrypted when the host is skipped, has been decrypted on the following link (which can be a host or relay point), and then encrypted before continuing on the following link . Each link can use a different key for data encryption or even a different algorithm. The process is repeated until the data recipient is accessed.