0.3. Cryptography

For the purposes of this book we will treat cryptographic algorithms in a very abstract way. We will be concerned with what properties such algorithms provide and not with the details of how they are implemented. In particular, details of their cryptographic strength will not really concern us; we will typically assume that the algorithms are secure (though in some of the more elaborate analyses we can take account of possible compromises).

In recent decades the science of cryptography has moved from being the exclusive preserve of governments and security agencies into the open world. This has been prompted partly by the increase in the importance of secure communications, but also in large part by the discovery of public-key ...

Get The Modelling and Analysis of Security Protocols: the CSP Approach now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.