January 2015
Intermediate to advanced
944 pages
33h 37m
English
In this chapter:
• Cryptology, cryptanalysis
• Symmetric encryption: DES, AES, and RC2, RC4, RC5, and RC6
• Asymmetric encryption: RSA
• Message digests: SHA
• Digital signatures: Elliptic curve cryptosystems, El Gamal, and DSA/DSS
• Quantum cryptography
A user’s manual describes the interface to and functions of a software product. If you really want to know how a piece of software is built, how it works, how to embed it in another piece of software, or what its detailed specifications are, you need a different kind of documentation. You do not normally need any of these advanced topics to use the software, however.
This chapter complements the discussion of encryption presented in Chapter 2. In that earlier chapter ...