With the cryptographic mechanisms that we have learned so far, in particular symmetric and asymmetric encryption, digital signatures and message authentication codes (MACs), one can relatively easily achieve the basic security services (cf. Sect. 10.1.3):
KeywordsSecure Channel Perfect Forward Secrecy Cryptographic Mechanism Pretty Good Privacy
Unable to display preview. Download preview PDF.