Skip to Main Content
Fundamentals of EMS, NMS and OSS/BSS
book

Fundamentals of EMS, NMS and OSS/BSS

by Jithesh Sathyan
April 2016
Intermediate to advanced content levelIntermediate to advanced
588 pages
15h 3m
English
Auerbach Publications
Content preview from Fundamentals of EMS, NMS and OSS/BSS

Chapter 31

Secure Communication

This chapter is about implement security in management applications. The different types of encryption and security protocols are discussed in this chapter. The chapter ends with an implementation example for encryption and decryption of messages.

31.1 Introduction

The study of transforming messages in order to make them secure and immune to attacks is known as cryptography. The original text message without any transformation is said to be in plaintext format. After applying transformation on the original message to make it secure, the message is called ciphertext. The plaintext is transformed to the ciphertext by the user through the encryption algorithm and the ciphertext is transformed back to the plaintext ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

The Essential Guide to Telecommunication, 6th Edition

The Essential Guide to Telecommunication, 6th Edition

Annabel Z. Dodd
An Introduction to 5G

An Introduction to 5G

Christopher Cox
Crucial Conversations

Crucial Conversations

Joseph Grenny, Kerry Patterson, Ron McMillan, Al Switzler, Emily Gregory

Publisher Resources

ISBN: 9781420085747