O'Reilly logo

Computer Security: Art and Science by Matt Bishop

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part 4. Implementation I: Cryptography

Cryptography provides many mechanisms on which security techniques and technologies are built. Part 4 reviews the basics of cryptography and its use in computer security.

Chapter 9, “Basic Cryptography,” reviews the principle elements of cryptosystems. It presents some classical ciphers, public key ciphers, and cryptographic hash functions. This material is the basis for Chapters 10, 11, and 12.

Chapter 10, “Key Management,” discusses the basics of managing cryptographic keys. Authentication and key exchange protocols are often combined, so this chapter includes authentication protocols that provide the ability to generate a common cryptographic key for future use. Generating keys is an intricate subject, full ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required