Chapter 2

Cryptography Basics

The security basics, confidentiality, integrity, authentication, authorization, accountability, and nonrepudiation were discussed in Chapter 1. In this chapter, we discuss how cryptography can help achieve many of these controls. We will apply these concepts to the operations of PKI and how PKI can deliver on the promise of these controls. From a cryptographic point of view, as shown in Table 2.1, some security basics have equivalent cryptography basics, while some of the security basics merge into a single cryptography basic, and we need to add some new cryptography basics.

Table 2.1

Security and Cryptography Basics

Security Basics

Cryptography Basics

Rationale

Confidentiality

Encryption ...

Get Security without Obscurity now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.