Chapter 6. Security Protocols

“...The wisest mind [always] has something yet to learn.”

—Author Unknown

By the end of this chapter, you should know and be able to explain the following:

• The difference between DES and 3DES encryption, including their limitations

• AES encryption and its strengths

• The function and role the MD5 hash plays in securing connections

• What a message digest is and how an SHA hash functions

• The differences between PPTP and L2TP

• The breadth and scope of SSH and how it is more secure than Telnet

Answering these key questions will enable you to better understand the overall characteristics and importance of network security. By the time you finish this book, you should have a solid appreciation for network security, ...

Get Network Security First-Step, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.