O'Reilly logo

Data Center Fundamentals by Maurizio Portolani, Mauricio Arregoces - CCIE No. 3285

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 15. Security Protocols and Technologies

This chapter covers the following topics:

• Symmetric cryptography: Data Encryption Standard (DES), Triple DES (3DES), Advanced Encryption Standard (AES), and Rivest’s Ciphers (RC2, RC4, RC5, and RC6)

• Asymmetric cryptography: Rivest, Shamir, and Adleman (RSA); Directory System Agent/Digital Signature Standard (DSA/DSS); and Diffie-Hellman (D-H)

• Hashing algorithms: Message Digest 2 (MD2), MD4, MD5, and Secure Hash Algorithm (SHA)

• Public-key infrastructure (PKI) concepts: standards, key generation, digital certificates, and certificate authorities (CAs)

• PKI deployment, including CA deployment options, chained certificates, enrollment, and revocation

• Transport security, including IP Security ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required