Skip to Content
Operating Systems: Concurrent and Distributed Software Design
book

Operating Systems: Concurrent and Distributed Software Design

by Jean Bacon, Tim Harris
March 2003
Intermediate to advanced
912 pages
27h 17m
English
Pearson Business
Content preview from Operating Systems: Concurrent and Distributed Software Design

8.3. Approaches to encryption

Encryption has been used for millennia. For an entertaining description, see Singh (1999) which starts with stories of techniques used in military campaigns in classical history and progresses through to computerized methods. Our concern here is encryption for distributed systems and this chapter gives an introduction to basic components which together are used to build secure systems. Schneier (1996) is an encyclopaedic reference on the subject and should be consulted for expansion and further references.

Definitions

A message originates in plaintext or cleartext. The process of encoding it to make it unreadable in transit is called encryption and the process of transforming it back into the original message is ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Operating System Design, 2nd Edition

Operating System Design, 2nd Edition

Douglas Comer
Operating Systems in Depth

Operating Systems in Depth

Thomas W. Doeppner

Publisher Resources

ISBN: 0321117891Purchase book