ABSTRACT

This chapter will look at general methods of making a secure connection. Basic encryption/decryption methods will be examined using symmetric key cryptography and asymmetric key cryptography (public key cryptography) leading to X.509 certificates, certificate authorities, and public key infrastructure. These materials relate to security for networked connections and resources. As such, the materials are also covered in network courses to some extent, and in more detail than here in cryptography and Internet security courses. This chapter presents the materials in the context of connecting users and computing resources, the basis for Grid computing. Chapter 5 will consider the specifics for Grid computing, which has additional security requirements and constraints.