This chapter applies cryptographic techniques to networking. Crypto provides the most effective general-purpose techniques to protect network traffic.
■ Role of crypto in communications security
■ Impact of using crypto at different protocol layers
■ Network key distribution techniques
■ Application, network, and link layer crypto
■ Policy guidance for crypto applications