Skip to Content
Security in Computing
book

Security in Computing

by Shari Lawrence Pfleeger, Charles P. Pfleeger, Jonathan Margulies
January 2015
Intermediate to advanced
944 pages
33h 37m
English
Pearson
Content preview from Security in Computing

12. Details of Cryptography

In this chapter:

• Cryptology, cryptanalysis

• Symmetric encryption: DES, AES, and RC2, RC4, RC5, and RC6

• Asymmetric encryption: RSA

• Message digests: SHA

• Digital signatures: Elliptic curve cryptosystems, El Gamal, and DSA/DSS

• Quantum cryptography

A user’s manual describes the interface to and functions of a software product. If you really want to know how a piece of software is built, how it works, how to embed it in another piece of software, or what its detailed specifications are, you need a different kind of documentation. You do not normally need any of these advanced topics to use the software, however.

This chapter complements the discussion of encryption presented in Chapter 2. In that earlier chapter ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security in Computing, Third Edition

Security in Computing, Third Edition

Charles P. Pfleeger, Shari Lawrence Pfleeger
Security in Computing, 6th Edition

Security in Computing, 6th Edition

Charles Pfleeger, Shari Lawrence Pfleeger, Lizzie Coles-Kemp
Practical Malware Analysis

Practical Malware Analysis

Michael Sikorski, Andrew Honig
Introduction to Computer Networks and Cybersecurity

Introduction to Computer Networks and Cybersecurity

Chwan-Hwa (John) Wu, J. David Irwin

Publisher Resources

ISBN: 9780134085074Purchase book