O'Reilly logo

Fundamentals of EMS, NMS and OSS/BSS by Jithesh Sathyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 31

Secure Communication

This chapter is about implement security in management applications. The different types of encryption and security protocols are discussed in this chapter. The chapter ends with an implementation example for encryption and decryption of messages.

31.1 Introduction

The study of transforming messages in order to make them secure and immune to attacks is known as cryptography. The original text message without any transformation is said to be in plaintext format. After applying transformation on the original message to make it secure, the message is called ciphertext. The plaintext is transformed to the ciphertext by the user through the encryption algorithm and the ciphertext is transformed back to the plaintext ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required