Skip to Content
Elementary Information Security, 3rd Edition
book

Elementary Information Security, 3rd Edition

by Richard E. Smith
October 2019
Beginner content levelBeginner
708 pages
26h
English
Jones & Bartlett Learning
Content preview from Elementary Information Security, 3rd Edition
Chapter Opener Photo

© Digital_Art/Shutterstock

CHAPTER 8Secret and Public Keys

About This Chapter

In this chapter we discuss fundamental issues and techniques for handling cryptographic keys. We also introduce the important concept of public-key cryptography. We examine the following topics:

  • ■   Managing and using secret keys

  • ■   Wrapping techniques for secret keys

  • ■   Detecting errors and protecting file integrity

  • ■   Public-key cryptography and, briefly, quantum cryptography

  • ■   Public-key techniques for signing data and wrapping keys

  • ■   Public-key certificates

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Computer and Information Security Handbook, 3rd Edition

Computer and Information Security Handbook, 3rd Edition

John R. Vacca

Publisher Resources

ISBN: 9781284153057