Use of cryptosystems day-to-day
Ssh
- commonly used between (mostly unix) systems
- provides reasonable coverage
- does not address many attack methods
https/shttp/ssl
- commonly used in web-based transactions
- provides reasonable coverage of message content
- does not address many attack methods