O'Reilly logo

The dotCrime Manifesto by Phillip Hallam-Baker

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Cryptography

If I had written this book ten years ago, cryptography would have been the topic of the first chapter. The terms network security and cryptography were considered to be synonymous. Today, we understand that cryptography is merely a useful tool, not a panacea.

What makes network security different from traditional computer security is that without cryptography, each machine in the network is essentially alone; there is no way for a machine to know with any confidence where any information came from unless it was obtained from a direct, physical connection to another machine. The attacker exploits this isolation. Cryptography provides “cement” that allows us to establish durable, trustworthy connections between machines regardless ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required