O'Reilly logo

Eleventh Hour Security+ by Ido Dubrawsky

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Protocols

Cryptographic algorithms are ephemeral—their useful life span is measured in years, rarely decades. Because of the constantly changing list of reliable cryptographic algorithms and also because it makes good engineering sense, the first thing that needs to be done when deciding to use cryptography is to agree between sender and recipient on a choice of cryptographic algorithm, and to exchange keying information where necessary. This process of agreement prior to exchange is defined in a “protocol” specification—just as in real life, a protocol is the set of agreed upon rules by which work is done, rather than the doing of the work itself.

SSL/TLS

Secure Socket Layer (SSL) and Transport Layer Security (TLS) refer to essentially the ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required