Chapter 31

Secure Communication

This chapter is about implement security in management applications. The different types of encryption and security protocols are discussed in this chapter. The chapter ends with an implementation example for encryption and decryption of messages.

31.1 Introduction

The study of transforming messages in order to make them secure and immune to attacks is known as cryptography. The original text message without any transformation is said to be in plaintext format. After applying transformation on the original message to make it secure, the message is called ciphertext. The plaintext is transformed to the ciphertext by the user through the encryption algorithm and the ciphertext is transformed back to the plaintext ...

Get Fundamentals of EMS, NMS and OSS/BSS now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.