O'Reilly logo

Security without Obscurity by W. Clay Epstein, Jeff Stapleton

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 2

Cryptography Basics

The security basics, confidentiality, integrity, authentication, authorization, accountability, and nonrepudiation were discussed in Chapter 1. In this chapter, we discuss how cryptography can help achieve many of these controls. We will apply these concepts to the operations of PKI and how PKI can deliver on the promise of these controls. From a cryptographic point of view, as shown in Table 2.1, some security basics have equivalent cryptography basics, while some of the security basics merge into a single cryptography basic, and we need to add some new cryptography basics.

Table 2.1

Security and Cryptography Basics

Security Basics

Cryptography Basics

Rationale

Confidentiality

Encryption ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required