11Chapter 6: Example Systems
22==============================
33
4+ .. Assuming we keep a substantial set of examples, we should look
5+ for ways to highlight the underlying open source software (and the
6+ general role open source plays in helping secure the Internet --
7+ lots of eyes on the code).
8+
49 We have now seen many of the components required to provide one or two
510aspects of security. These components include cryptographic algorithms,
611key predistribution mechanisms, and authentication protocols. In this
7- section , we examine some complete systems that use these components.
12+ chapter , we examine some complete systems that use these components.
813
914These systems can be roughly categorized by the protocol layer at which
1015they operate. Systems that operate at the application layer include
@@ -14,7 +19,7 @@ layer, there is the IETF’s Transport Layer Security (TLS) standard and
1419the older protocol from which it derives, Secure Socket Layer (SSL). The
1520IPsec (IP Security) protocols, as their name implies, operate at the IP
1621(network) layer. 802.11i provides security at the link layer of wireless
17- networks. This section describes the salient features of each of these
22+ networks. This chapter describes the salient features of each of these
1823approaches.
1924
2025You might reasonably wonder why security has to be provided at so many
@@ -49,7 +54,7 @@ Pretty Good Privacy (PGP) is a widely used approach to providing
4954security for electronic mail. It provides authentication,
5055confidentiality, data integrity, and nonrepudiation. Originally devised
5156by Phil Zimmerman, it has evolved into an IETF standard known as
52- OpenPGP. As we saw in a previous section , PGP is notable for using a
57+ OpenPGP. As we saw in a previous chapter , PGP is notable for using a
5358“web of trust” model for distribution of keys rather than a tree-like
5459hierarchy.
5560
@@ -94,7 +99,7 @@ Bob of the level of trust he has in Alice’s public key.
9499Email has particular characteristics that allow PGP to embed an adequate
95100authentication protocol in this one-message data transmission protocol,
96101avoiding the need for any prior message exchange (and sidestepping some
97- of the complexities described in the previous section ). Alice’s digital
102+ of the complexities described in the previous chapter ). Alice’s digital
98103signature suffices to authenticate her. Although there is no proof that
99104the message is timely, legitimate email isn’t guaranteed to be timely
100105either. There is also no proof that the message is original, but Bob is
0 commit comments