Core Security Patterns by Steel, Nagappan & Lai (2006)

Notes, Discussion Points and Review

Chapter Two - "Basics of Security"

Requirements and Goals:

One-Way Hash Function Algorithms (SHA, MD5) - create a short digest that can be used to verify the integrity of the message or file.

Symmetric Ciphers - encryption and decryption is done with the same key (relatively fast).

Asymmetric Ciphers - 1,000 times slower than symetric ciphers - the key used for decryption is different from the key used for encryption.

Digital Certificates (X.509 certificate)

Certificate Authorities

SSL - Secure Sockets Layer

LDAP - Lightweight Directory Access Protocol