O'Reilly logo

The Modelling and Analysis of Security Protocols: the CSP Approach by S. A. Schneider, P. Y.A. Ryan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

0.3. Cryptography

For the purposes of this book we will treat cryptographic algorithms in a very abstract way. We will be concerned with what properties such algorithms provide and not with the details of how they are implemented. In particular, details of their cryptographic strength will not really concern us; we will typically assume that the algorithms are secure (though in some of the more elaborate analyses we can take account of possible compromises).

In recent decades the science of cryptography has moved from being the exclusive preserve of governments and security agencies into the open world. This has been prompted partly by the increase in the importance of secure communications, but also in large part by the discovery of public-key ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required