Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Chapter 12

Cipher Techniques

IAGO: So will I turn her virtue into pitch, And out of her own goodness make the net That shall enmesh them all.

The Tragedy of Othello, II, iii, 361–363.

Cryptographic systems are sensitive to environment. Using cryptosystems over a network introduces many problems. This chapter presents examples of these problems and discusses techniques for dealing with them. First comes a description of stream and block ciphers, followed by a review of the organization of the network layers. We then present several network protocols to show how these techniques are used in practice.

The key point of this chapter is that the strength of a cryptosystem depends in part on how it is used. A mathematically strong cryptosystem is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145