December 2017
Intermediate to advanced
311 pages
10h 23m
English
Cryptography can effectively ensure the confidentiality, integrity, authenticity and nonrepudiation of information, which is the core foundation of information security. The focus of the appendix is to introduce some common cryptographic algorithms and basic knowledge in trusted computing research, including block ciphers algorithm, public-key cryptography algorithm, digital signature algorithm, hash function and key exchange protocol.
The main goal of the cryptographic algorithm is to provide data confidentiality. A cryptographic algorithm is defined as a pair of data transformation. One of the transformation is applied to the original data, known as plaintext, and the corresponding ...
Read now
Unlock full access