2

Secure Channel and the CIA Triad

In this chapter, we discuss the fundamental objective of cryptography and computer security, namely enabling two parties to communicate securely over an insecure communication channel. As we will see shortly, this is not an easy task to accomplish because the communication needs to be secure against both passive and active attackers.

But how can we achieve security if the attacker is allowed to listen to the entire communication and even manipulate the messages sent over the channel? And what are the fundamental design principles that we must follow to build systems that can protect that communication?

To answer these questions, we will cover the most important cryptographic definitions, essential design principles, ...

Get TLS Cryptography In-Depth now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.