5. Cryptographic Algorithms

5.1Introduction
5.2Secure Transmission of Messages
5.3Key Exchange
5.4Digital Signatures
5.5Entity Authentication
 Chapter Summary
 Sugestions for Further Reading

An essential element of freedom is the right to privacy, a right that cannot be expected to stand against an unremitting technological attack.

—Whitfield Diffie

Mary had a little key (It’s all she could export), and all the email that she sent was opened at the Fort.

—Ronald L. Rivest

Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.

—Clifford Stoll

Get Public-key Cryptography: Theory and Practice now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.