2 Cryptography Basics

DOI: 10.1201/9781003425298-2

The security basics, confidentiality, integrity, authentication, authorization, accountability, and nonrepudiation were discussed in Chapter 1, “Introduction.” In this chapter, we discuss how cryptography can help achieve many of these controls. We will apply these concepts to the operations of PKI and how PKI can deliver on the promise of these controls. From a cryptographic point of view, as shown in Table 2.1, some security basics have equivalent cryptography basics, while some of the security basics merge into a single cryptography basic, and we need to add some new cryptography basics.

Cryptography is literally defined as the process of writing or reading secret messages,1 whereas cryptanalysis ...

Get Security Without Obscurity, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.