CHAPTER
10 Cryptography: A Sharp and Fragile Tool
Overview
• 10.4.1 Transmission to Intended Recipients
• 10.5 Public-Key Cryptography
• 10.5.2 Certificates and Certificate Authorities
• 10.5.4 Side Effect of Public-Key Cryptography
• 10.8 Chinks in the Cryptographic Armor
• 10.8.1 Quantum Cryptanalytics: Disruptive Technology
• 10.9 Cryptography Is Not a Panacea
• 10.10 Beware of Homegrown Cryptography
Learning Objectives
• Explain ...
Get Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.