November 2018
Intermediate to advanced
1440 pages
48h 29m
English
Cryptography provides many mechanisms on which security techniques and technologies are built. Part IV reviews the basics of cryptography and its use in computer security. Chapter 10, “Basic Cryptography,” reviews the principle elements of cryptosystems. It presents some symmetric ciphers, public key ciphers, cryptographic hash functions, and digital signatures. This material is the basis for Chapters 11, 12, and 13.
Chapter 11, “Key Management,” discusses the basics of managing cryptographic keys. Authentication and key exchange protocols are often combined, so this chapter includes authentication protocols that provide the ability to generate a common cryptographic key for future use. Generating keys is ...
Read now
Unlock full access