Cryptography Basic Components

You now know that confidentiality is a function of encryption, data integrity is a function of hashing, and authentication is the process of proving the identity of the other side of the tunnel. Now it is time to take a look at how those methods are implemented and the choices you have for each.

This section discusses the basic components of cryptography, including algorithms for hashing, encryption, and key management, which may be used by VPNs.

Image
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.244.66