We achieve very important benefits if we apply cryptography at the very top of the application layer or even above the network protocol stack. It is much easier to develop software as an application instead of making changes to OS or networking software (FIGURE 13.15). This also provides the benefits of end-to-end crypto.
Get Elementary Information Security, 3rd Edition now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.