Certificates and Public Key Cryptography
We concluded the previous chapter by describing the standard way of enabling HTTPS on an Apache web server. Our main goal was to protect the information exchanged between clients and the server from adversaries eavesdropping on communication. In this chapter, we will brush up on public key cryptography and examine its use in more detail.
KeywordsSigning Request Symmetric Cryptography Asymmetric Cryptography Revocation List Client Authentication
Unable to display preview. Download preview PDF.