Chapter 10. Cryptography Explained
In this chapter:
Mathematics of encryption
Cryptanalysis: how encryption systems are “broken”
Theory of strong symmetric algorithms
Detailed descriptions of the DES and AES algorithms
Theory of public key encryption
Detailed description of the RSA algorithm; details of other public key algorithms
Digital signatures
Quantum cryptography
Creating and implementing good cryptography is subtle and difficult, because the goals of a cryptographic algorithm seem to conflict with each other. We want to construct an algorithm that is easy for the legitimate sender and receiver to operate, but difficult—bordering on impossible—for the malicious interceptor to break. As we noted in Chapter 2, the interceptor can use any kind ...
Get Security in Computing, Third Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.