▶ 13.3 Crypto Atop the Protocol Stack
We achieve very important benefits if we apply cryptography at the very top of the application layer or even above the network protocol stack. It is much easier to develop software as an application instead of making changes to OS or networking software (FIGURE 13.15). This also provides the benefits of end-to-end crypto.
Get Elementary Information Security, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.