Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Chapter 10

Basic Cryptography

YORK: Then, York, be still awhile, till time do serve:

Watch thou and wake when others be asleep,

To pry into the secrets of the state;

The Second Part of King Henry the Sixth, I, i, 249–260.

Cryptography is a deep mathematical subject. Because this book focuses on system security, we consider cryptography as a supporting tool. Viewed in this context, the reader needs only a brief overview of the major points of cryptography relevant to that use. This chapter provides such an overview.

Cryptographic protocols provide a cornerstone for secure communication. These protocols are built on ideas presented in this chapter and are discussed at length in later chapters.

10.1 Cryptography

The word cryptography comes ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145