O'Reilly logo

CISSP in 21 Days - Second Edition by M. L. Srinivasan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Applications and the use of cryptography

Cryptographic systems are the common implementations of standard algorithms. They may be used in applications and embedded systems.

The following are some systems that are popular:

  • Transport Layer Security (TLS) and its predecessor Secure Sockets Layer (SSL) are protocols that provide communication security by encrypting sessions while using the Internet. They use many of the cryptographic algorithms discussed previously. Some of the activities that can be secured by TLS or SSL are web browsing, e-commerce transactions such as online shopping, banking, and more, and instant messaging or Internet chat.
  • Secure Electronic Transaction (SET) is a set of standard protocols for securing credit card transactions over ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required