February 2004
Intermediate to advanced
608 pages
15h 11m
English
Public-Key cryptography is seeing wide application and acceptance in e-business applications. One thing is increasingly clear: If public-key cryptography is to be effective in e-business, standards must be interoperable. Even though vendors may agree on the basic public-key algorithms and protocols, compatibility between implementations is not guaranteed. Interoperability requires strict adherence to an agreed-on standard format for transferred data. The Public-Key Cryptography Standards provide such a basis for interoperability.
These PKCS standards include both algorithm-specific and algorithm-independent implementation standards. Two of the many algorithms supported are Rivest-Shamir-Adleman (see Section 10.3.1.1 ...