2Cryptographic Algorithms and Protocols
Mohammad Khalid Imam Rahmani
Contents
- 2.1Introduction
- 2.2Preliminaries
- 2.2.1Cryptographic Goals
- 2.3Cryptographic Algorithms
- 2.3.1Symmetric Key Algorithms
- 2.3.1.1Data Encryption Standard (DES)
- 2.3.1.2Triple DES or TDEA
- 2.3.1.3RC2
- 2.3.2Asymmetric Key Algorithms
- 2.3.3Digital Signature Algorithm
- 2.3.4Hash Functions
- 2.4Cryptographic Protocol
- 2.4.1Arbitrated Protocols
- 2.4.2Adjudicated Protocols
- 2.4.3Self-Enforcing Protocols
- 2.4.4Types of Protocols
- 2.4.4.1Key Exchange Protocols
- 2.4.4.2Diffie-Hellman Key Exchange
- 2.4.4.3Identification and Authentication Protocols
- 2.4.4.4Using Password Authentication
- 2.4.4.5Protocol Using Digital Signatures
- 2.5Issues in Cryptography
- 2.6Conclusion
Get A Step Towards Society 5.0 now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.