In this chapter, we will protect our tunnel with something more solid than a simple XOR, as modern malware is using a well-known ciphering algorithm to protect its traffic in the transit path.
The topics covered in this chapter are as follows:
- Introduction to encryption algorithms
- Protecting your tunnel with AES – stream mode
- Protecting your tunnel with RSA
- Hybrid encryption key