O'Reilly logo

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks by Francois Dessart, Srinivas Tenneti, Andre Karamanian

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 1. Crypto Refresh

This chapter covers the following topics:

Confidentiality, Integrity, Authenticity, Nonrepudiation

Symmetric Encryption

Asymmetric Encryption

Other Crypto Functions

Internet Key Exchange (IKE)

Device Configuration: Certificates

Cryptography has been used throughout history to hide messages and keep secrets. There have been various techniques used that have been concurrent with the technology available for that time. In today’s world, ever increasing high-powered computing systems networked together have created a new paradigm. This complexity to provide data and identity security requires a new paradigm of information security.

This book assumes you are a network engineer who has been exposed to the basics ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required