Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
382 Cyberpower
comfort over the integrity of data by using hash (digest) functions. In practice,
for reasons of speed of the encryption of large volumes of transmitted data, a
combination of symmetric and asymmetric encryption is often employed with
the benets of the advantages of both methods being enjoyed, at least in part.
In order to implement a system of asymmetric encryption, use needs to
be made of a double key consisting of a private key (secret, known only to
its owner) and a public key (non-secret, available to all who might need it).
The main advantage of this approach is that there is no need to share a secret
key. On the other hand, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048