With the rapid growth of the Internet, secure communication is becoming critical. Using the cryptography approach to secure communication is one of the essential steps of providing secure access to information with integrity, authenticity, and confidentiality.
This chapter presented a detailed overview of the cryptography solutions and various types of VPN deployments. It started with a brief introduction to cryptosystems and an overview of cryptography, followed by an explanation of basic cryptography terminology.
The major portion of the chapter provided details of the three types of cryptographic algorithms (symmetric key cryptography, asymmetric key cryptography, and hash algorithms), giving detailed explanations using supporting diagrams and illustrations, and listed some of the most common algorithms that are in use today.
The chapter concluded with a basic description of the VPN design and deployments using cryptographic and noncryptographic approaches.
This chapter builds the foundation knowledge of cryptographic algorithms and protocols required for the next chapter, which covers IPsec VPN employing cryptography.