Encryption and Hashing?
itdaddy
Member Posts: 2,089 ■■■■□□□□□□
Hey security gurus
I have worked with encryption and hashing but need to get a grip on it better.
where do i look (books sites?) and what certs?
Tunneling protocols like PPTP and L2TP are vpn encryption protocols right
and then the data is hashed with SHA1, SHA2 and or MD5 respectively?
seems to me data is tunneled and the tunnel is encrypted? and the data is hashed and sealed? is this the common mode of operation?
Just like SSL/HTTPS tunnel you could say and then you have PKI certs used to hash the data?
and say ssh tunnel and the say a proctol like rdp/ssh or vnc/ssh tunnel are these all the same? similar
and then you have IPSEC? how does that work? same way like an ipsec tunnel?
do yuo guys know of any good books or cbts to put this all together?
thanks
I have worked with encryption and hashing but need to get a grip on it better.
where do i look (books sites?) and what certs?
Tunneling protocols like PPTP and L2TP are vpn encryption protocols right
and then the data is hashed with SHA1, SHA2 and or MD5 respectively?
seems to me data is tunneled and the tunnel is encrypted? and the data is hashed and sealed? is this the common mode of operation?
Just like SSL/HTTPS tunnel you could say and then you have PKI certs used to hash the data?
and say ssh tunnel and the say a proctol like rdp/ssh or vnc/ssh tunnel are these all the same? similar
and then you have IPSEC? how does that work? same way like an ipsec tunnel?
do yuo guys know of any good books or cbts to put this all together?
thanks
Comments
-
JDMurray Admin Posts: 13,110 AdminIt really depends on how deeply you want to get into the math of cryptography, or if you just want to stay in the applications part of it. Network security and crypto books by Stallings and Schneier are highly recommended. And the cryptography portal at Wikipedia is a very good place to start. Certification books are mostly about the application of crypto, some of the algorithmic operations, and usually none of the math.