Summary
In this chapter, you have learned basic security concepts necessary for VPN technologies. There are several websites with excellent material on IT security issues. You have received an overview of basic security and encryption issues and know why complexity is always an enemy of security. With symmetric keying, both encryption partners use the same key, but when asymmetric keying is used, the encryption key is different from the one used for decrypting the data. The SSL/TLS library uses asymmetric keying and provides certificates used by millions of websites. The certificates can be signed by official authorities like our passports or ID cards, or self-signed by a local authority. This is called third-party authentication because a certificate signed by third party is trusted.