13Secure Sockets Layer/Transport Layer Security Protocol

In this chapter we will cover the following:

image   Digital signatures

image   Digital certificates

image   The Public Key Infrastructure (PKI)

image   SSL/TLS basics

The preceding 12 chapters have covered the algorithms used in cryptography, including symmetric key cryptography, asymmetric key cryptography, cryptographic ...

Get Modern Cryptography: Applied Mathematics for Encryption and Information Security now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.