Provided by: SecurityTube.net
Date Added: Mar 2013
Application architects need to make informed choices to use cryptography well: alternative key architectures have their merits and drawbacks. PKIs, in particular, should be contrasted with symmetric key architectures such as Kerberos. Network protocol characteristics are pivotal in ensuring distributed applications meet security requirements.