October 2019
Beginner
708 pages
26h
English
© Digital_Art/Shutterstock
This chapter applies cryptographic techniques to networking. Crypto provides the most effective general-purpose techniques to protect network traffic.
■ Role of crypto in communications security
■ Impact of using crypto at different protocol layers
■ Network key distribution techniques
■ Application, network, and link layer crypto
■ Policy guidance for crypto applications