5. Cryptographic Algorithms
5.1 | Introduction |
5.2 | Secure Transmission of Messages |
5.3 | Key Exchange |
5.4 | Digital Signatures |
5.5 | Entity Authentication |
Chapter Summary | |
Sugestions for Further Reading |
An essential element of freedom is the right to privacy, a right that cannot be expected to stand against an unremitting technological attack.
—Whitfield Diffie
Mary had a little key (It’s all she could export), and all the email that she sent was opened at the Fort.
—Ronald L. Rivest
Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.
—Clifford Stoll
Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.