Part 4. Implementation I: Cryptography

Cryptography provides many mechanisms on which security techniques and technologies are built. Part 4 reviews the basics of cryptography and its use in computer security.

Chapter 9, “Basic Cryptography,” reviews the principle elements of cryptosystems. It presents some classical ciphers, public key ciphers, and cryptographic hash functions. This material is the basis for Chapters 10, 11, and 12.

Chapter 10, “Key Management,” discusses the basics of managing cryptographic keys. Authentication and key exchange protocols are often combined, so this chapter includes authentication protocols that provide the ability to generate a common cryptographic key for future use. Generating keys is an intricate subject, full ...

Get Computer Security: Art and Science now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.