CHAPTER 7
ENCRYPTION
Stephen Cobb and Corinne LeFrançois
7.1 INTRODUCTION TO CRYPTOGRAPHY
7.2.2 More Cryptic Terminology
7.2.4 Brute Force Cryptanalysis
7.2.5 Monoalphabetical Substitution Ciphers
7.2.6 Polyalphabetical Substitution Ciphers
7.2.8 Early-Twentieth-Century Cryptanalysis
7.3.3 Transposition, Rotors, Products, and Blocks
7.3.4 Data Encryption Standard
7.4.4 Limitations and Combinations
7.5.1 Communications and Storage
7.5.2 Securing the Transport Layer
7.5.3 X.509v3 Certificate Format
7.6.1 Elliptic Curve Cryptography
7.1 INTRODUCTION TO CRYPTOGRAPHY.
The ability to transform data so that they are accessible only to authorized persons is just one of the many valuable services performed by the technology commonly referred to as encryption. This technolosy has appeared in other chapters, but some readers may not be familiar with its principles and origins. The purpose of this chapter is to explain encryption technology ...
Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.