Everyday Cryptography: Fundamental Principles and Applications - Keith Martin - Google книги
This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research.
Everyday Cryptography is a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. Public-Key Encryption 6.
Data Integrity 7. Digital Signature Schemes 8. Entity Authentication 9. Cryptographic Protocols Key Management Key Management Public-Key Management Use of Cryptography Cryptographic Applications Cryptography for Personal Devices Control of Cryptography See All Customer Reviews. Shop Books. Read an excerpt of this book! Add to Wishlist.
- Love, Marriage and Family Ties in the Middle Ages (IMR) (International Medieval Research).
- Everyday Cryptography - Martin, Keith M. - | HPB?
- Everyday Cryptography: Fundamental Principles and Applications.
- Top Authors.
- Everyday Cryptography - CERN Document Server.
- Laskers Manual of Chess.
USD Sign in to Purchase Instantly. Usually ships within 6 days. Overview Cryptography is a vital technology that underpins the security of information in computer networks. Closing Remarks. Average Review. Write a Review. Related Searches. A Farewell to Ice: A Report from the. Based on five decades of research and observation, a haunting and unsparing look at the Based on five decades of research and observation, a haunting and unsparing look at the melting ice caps, and what their disappearance will mean.
Get this edition
They are full of equations, proofs, algorithms, and protocols. The books can be difficult to read, hard to digest, and poorly suited to the layman. However, if you are interested in cryptography to understand its uses, where you might find it in your life, how cryptography works, and what sorts of applications it is good for, then this book is a good guide.
This book does not make that assumption. Rather, Martin takes the approach of textual explanations, simple diagrams, and he walks the reader through the topics with easy to understand language.
The result is a book suitable to any reader without preconditions. The book begins with motivations for cryptography.
Join Kobo & start eReading today
You need cryptological algorithms to ensure your data, say a document, is not altered in transit. For example, cryptography ensures someone cannot intercept an email, change the contents, and have the recipient none the wiser. Moreover, you may want to digitally sign a document in a way that no one else can, just like you sign a paper document with a pen. These systems, interestingly, put all the secret information in the encryption key. The algorithms are well-known and one can implement them easily on a computer.
Cryptographical attacks can be cunningly sophisticated, and while not discussed thoroughly in this book, even well-written software can leak details of your key and be broken. As an aside, the reason data encryption algorithms are usually publicly known is because at one time the algorithms were kept a secret.
But when the wartime enemy discovered the algorithm, he then could decrypt any previously stored messages. The book presents public key encryption algorithms, which are non-symmetric: the encryption key is different from the decryption key. The general idea to public key algorithms is there are two keys: a public and private key.
Everyday Cryptography: Fundamental Principles and Applications by Keith Martin (Paperback, 2017)
The keys are related but that relationship is not obvious by looking at the keys. Say Alice wants to send Bob a message. Bob uses his private key to decrypt the message. Unless a person knows the private key, the message cannot be decrypted. Martin provides the details of this process.
After public key algorithms, the book discusses data integrity which calls for hash functions. Hash functions are one-way functions that take a message as input, say a one-million bits long, and computes a sequence of bits, say bits long, called a digest of the message that is the output.
Related Everyday Cryptography: Fundamental Principles and Applications
Copyright 2019 - All Right Reserved