Table of Contents
Preface
Section 1: Securing Our Data
Chapter 1: Protecting Data in Motion or at Rest
Outlining the current threat landscape
Digitally transforming our world
Threatening the security of our data
Understanding security services
Investigating X.800
Introducing common cryptographic concepts
Trusting a TTP
Managing keys using the PKI
Getting to know Bob and Alice
Outlining substitution and transposition
Substituting characters
Transposing the text
Breaking the code
Summary
Questions
Further reading
Chapter 2: The Evolution of Ciphers
Early uses of cryptography
Using tattoos and scytales
Evaluating monoalphabetic ciphers
Recognizing polyalphabetic ciphers
Encoding transmissions during war
Communicating during wartime
Examining ...
Get Modern Cryptography for Cybersecurity Professionals now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.