Appendix A:Foundations of Cryptography

Cryptography can effectively ensure the confidentiality, integrity, authenticity and nonrepudiation of information, which is the core foundation of information security. The focus of the appendix is to introduce some common cryptographic algorithms and basic knowledge in trusted computing research, including block ciphers algorithm, public-key cryptography algorithm, digital signature algorithm, hash function and key exchange protocol.

A.1Block Cipher Algorithm

The main goal of the cryptographic algorithm is to provide data confidentiality. A cryptographic algorithm is defined as a pair of data transformation. One of the transformation is applied to the original data, known as plaintext, and the corresponding ...

Get Trusted Computing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.