World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

An Introduction to Cryptography

Click here to view

Book Id: WPLBN0000697750
Format Type: PDF eBook
File Size: 823.31 KB.
Reproduction Date: 2005

Title: An Introduction to Cryptography  
Author:
Volume:
Language: English
Subject: Marketing, Management, Finance
Collections: Technical eBooks Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

An Introduction to Cryptography. (n.d.). An Introduction to Cryptography. Retrieved from http://www.ebooklibrary.org/


Description
Technical Reference Publication

Excerpt
Excerpt: Cryptography is the stuff of spy novels and action comics. Kids once saved up bubble-gum wrappers and sent away for Captain Midnight?s Secret Decoder Ring. Almost everyone has seen a television show or movie involving a nondescript suit-clad gentleman with a briefcase handcuffed to his wrist. The word ?espionage? conjures images of James Bond, car chases, and flying bullets. And here you are, sitting in your office, faced with the rather mundane task of sending a sales report to a coworker in such a way that no one else can read it. You just want to be sure that your colleague was the actual and only recipient of the email and you want him or her to know that you were unmistakably the sender. It?s not national security at stake, but if your company?s competitor got a hold of it, it could cost you. How can you accomplish this?...

Table of Contents
Table of Contents Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . v Who should read this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v How to use this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .v For more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi Customer service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi Technical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi Related reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Chapter 1. The Basics of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . 11 Encryption and decryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 What is cryptography? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 Strong cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 How does cryptography work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 Conventional cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Caesar?s Cipher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 Key management and conventional encryption . . . . . . . . . . . . . . . . . . . . . . . 14 Public key cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 How PGP works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Keys . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Digital signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Hash functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Digital certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Validity and trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Checking validity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Establishing trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Meta and trusted introducers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Trust models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Direct Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Hierarchical Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 Web of Trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 Levels of trust in PGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

 

Click To View

Additional Books


  • Lectures in the Forum in Industrial Jour... (by )
  • The Lost Solar System of the Ancients Di... (by )
  • Biological Lectures Delivered at the Mar... (by )
  • Œuvres de Fourier : Vol. 1 Volume Vol. 1 (by )
  • Journal : Chemical Society (Great Britai... Volume Index S 1903-12 (J-Z) (by )
  • A History of the Society of Writers to H... (by )
  • Proceedings of the National Convention o... (by )
  • Boonton, The Gem of the Mountains 
  • Biennial Report of the Bureau of Labor S... (by )
  • Biennial Report of the Bureau of Labor S... (by )
  • Biennial Report of the Bureau of Labor S... (by )
  • Biennial Report (by )
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.