This tutorial is a guide for those who are considering installing - or have already installed - cryptographic protection in their computer systems. The reader should have a reasonable knowledge about computers and computer security problems in general. Although technical in nature, the specific vocabulary is explained in the text, and a glossary is provided. Containing facts and experience which must otherwise be collected from a great many sources, it covers why, when and how to use cryptography, the principles of and demands on cryptographic algorithms, key management, possible problems with communications protocols, and the current state of standardization in the field. It is aimed at those who want to learn about cryptographic protection in a computer environment without specializing in the field.
This tutorial is a guide for those who are considering installing - or have already installed - cryptographic protection in their computer systems. The reader should have a reasonable knowledge about computers and computer security problems in general. Although technical in nature, the specific vocabulary is explained in the text, and a glossary is provided. Containing facts and experience which must otherwise be collected from a great many sources, it covers why, when and how to use cryptography, the principles of and demands on cryptographic algorithms, key management, possible problems with communications protocols, and the current state of standardization in the field. It is aimed at those who want to learn about cryptographic protection in a computer environment without specializing in the field.
Sprache
Verlagsort
Verlagsgruppe
Elsevier Science & Technology
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
Maße
Höhe: 230 mm
Breite: 150 mm
ISBN-13
978-0-444-70484-9 (9780444704849)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
1. Introduction (P. Mattila). 2. Applications. Confidentiality. Data Authentication. Authentication of Identity. Software Protection (S. Herda). 3. Algorithms. Introduction. Theoretical Security. Stream Ciphers and Block Ciphers. Examples of Attacks. Modes and Comparisons. Crypto Variables. Public Key Systems. Evaluation of Cryptographic Algorithms (K.-O. Widman) 4. Protecting the Protection. Key Management (W. Price). Crypto Environment (S.-A. Ekhall). 5. Encryption and Communication. Communication Principles. Encryption and the Communication Architecture. Practical Examples (P. Christoffersson). 6. Standards for Data Security (W. Price). 7. Encryption Implementations. Hardware. Software. Choosing an Implementation (V. Fak). 8. Glossary and Abbreviations. 9. References. Index.