Extending Security and Availability with Cryptography and VPNs

Chapter 12 Designing a Cryptographic Solution

Chapter 13 Implementing Digital Signatures

Chapter 14 Exploring PKI and Asymmetric Encryption

Chapter 15 Building a Site-to-Site IPsec VPN Solution

This chapter covers the following topics:

Introducing cryptographic services:

Cryptographic services can be divided into two halves: the construction of codes and the breaking of codes. This section explores the interworking of cryptographic services and examines symmetric and asymmetric algorithms. It also discusses the use of block and stream ciphers, because these are used to manipulate and secure data by various algorithms.

Exploring symmetric encryption: This section focuses on symmetric encryption to help you better understand their nature and uses. It looks at a variety of symmetric algorithms, including DES, 3DES, AES, SEAL, and various Rivest ciphers (RC). As we explore these algorithms, you will gain an understanding of their use and the benefits they provide to modern computing environments.

Understanding security algorithms: This section examines the characteristics of encryption algorithms, discusses cryptographic hashes, and explores the role of key management in securing the encryption process. This section also looks at implementing encryption by examining its use in an SSL VPN.

0 0

Post a comment