Data Protection and Security

   

VIII

Standards and Protocols

   

VIII.VI

Summary

   

   
 

We conclude our discussion in this course by introducing some of the most used security protocols and standards in this final chapter.

In section 2, we have seen various aspects of the PKI concept which is most of the type a big headache for deploying public key cryptography applications due to difficulty in managing and maintaining it.

In section 3, we have introduced certificate revocation problem which is maybe the most challenging problem in any PKI framework.

In section 4, we have summarized SSL protocol which has been a succesful protocol by its simple solution for public key management.

SSL is an end-to-end security protocol working above layer 4 and IPsec, the alternative to SSL that works on layer 3 is the topic of section 5.

There are other security protocols and standards for other network applications. We have mentioned Kerberos and SSH in chapter 7. We suggest readers to download PGP software from www.pgpi.org and to install and use it in order to get an idea about electronic mail security and protocols.

 

   

QUIZ

Standards and Protocols

   

   
       
 
«previous session [1]  
   
       
 
«proceed to previous section  
  chapter index