Chapter 1. Crypto Refresh

This chapter covers the following topics:

Confidentiality, Integrity, Authenticity, Nonrepudiation

Symmetric Encryption

Asymmetric Encryption

Other Crypto Functions

Internet Key Exchange (IKE)

Device Configuration: Certificates

Cryptography has been used throughout history to hide messages and keep secrets. There have been various techniques used that have been concurrent with the technology available for that time. In today’s world, ever increasing high-powered computing systems networked together have created a new paradigm. This complexity to provide data and identity security requires a new paradigm of information security.

This book assumes you are a network engineer who has been exposed to the basics ...

Get PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.