After reading this chapter, you should have a good understanding of what the Go cryptography packages are capable of. Using the examples given in this chapter as a reference, you should feel comfortable performing basic hash operations, encrypting, decrypting, generating keys, and using keys.
Additionally, you should understand the difference between symmetric and asymmetric encryption, and how it is different from hashing. You should feel comfortable with the basics of running a TLS server and connecting with a TLS client.
Remember, the goal is not to memorize every detail, but to remember what options are available so that you can choose the best tool for the job.
In the next chapter, we will look at using secure shell, also known as SSH. Authenticating with public and private key pairs and passwords is covered first, along with how to verify the remote host's key...