NETWORK ENCRYPTION

CHAPTER

14

ABOUT THIS CHAPTER

This chapter applies cryptographic techniques to networking. Crypto provides the most effective general-purpose techniques to protect network traffic.

  Role of crypto in communications security

  Impact of using crypto at different protocol layers

  Network key distribution techniques

  Application, network, and link layer crypto

  Policy guidance for crypto application

14.1   Communications Security

In the previous four chapters, we focused on protecting information by keeping threats away from our network. If we connect our network with the Internet, we firewall the connection to try to exclude Internet-based threats—but this doesn’t help us when we need to transfer information ...

Get Elementary Information Security, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.