Data Protection and Security |
||||||
VIII |
Standards and Protocols |
|||||
VIII.VI |
Summary |
|||||
We conclude our discussion in this course by introducing some of the most used security protocols and standards in this final chapter. In section 2, we have seen various aspects of the PKI concept which is most of the type a big headache for deploying public key cryptography applications due to difficulty in managing and maintaining it. In section 3, we have introduced certificate revocation problem which is maybe the most challenging problem in any PKI framework. In section 4, we have summarized SSL protocol which has been a succesful protocol by its simple solution for public key management. SSL is an end-to-end security protocol working above layer 4 and IPsec, the alternative to SSL that works on layer 3 is the topic of section 5. There are other security protocols and standards for other network applications. We have mentioned Kerberos and SSH in chapter 7. We suggest readers to download PGP software from www.pgpi.org and to install and use it in order to get an idea about electronic mail security and protocols.
|
||||||
QUIZ |
Standards and Protocols |
|||||
|
||||||
|
chapter index | |||||