Making TCP/IP Secure

Encryption

Substitution

Substitution is swapping letters of the alphabet for other letters of the alphabet.

XOR

Symmetric-Key Encryption

Encryption that uses the same key for both encryption and decryption.

Asymmetric-Key Cryptography

Encryption that uses different keys for encryption and decryption. Common algorithms : RSA, DSA, ECDSA.

Encryption and the OSI Model