This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies. Covering the timeless fundamental principles of modern cryptography, it tackles emerging themes such as post-quantum cryptography and the increased demand for cryptographic tools supporting privacy.
This book presents a comprehensive introduction to the role that cryptography plays in supporting digital security for everyday technologies. Covering the timeless fundamental principles of modern cryptography, it tackles emerging themes such as post-quantum cryptography and the increased demand for cryptographic tools supporting privacy.
Keith M. Martin is a professor of information security at Royal Holloway, University of London. He has broad research interests, with a focus on application of cryptography and geopolitical aspects of cyber security. Keith has authored over 100 research publications in cyber security, as well as articles in the popular and professional press. He co-designed Royal Holloway's online postgraduate programmes in cyber security and has overseen its cyber security doctoral programme. He has also presented courses on cyber security to a wide range of audiences, including specialist industrial short courses, the general public and schools.
Inhaltsangabe
1: Preface to the Third Edition 2: Preface I Setting the Scene 3: Basic Principles 4: Historical Cryptosystems 5: Theoretical versus Practical Security II The Cryptographic Toolkit 6: Symmetric Encryption 7: Public-Key Encryption 8: Data Integrity 9: Entity Authentication III Implementation and Key Management 10: Implementation of Cryptography 11: Key Management 12: Management of Public Keys IV Use of Cryptography 13: Applications of Cryptography 14: Cryptography for Personal Devices 15: Cryptography for Privacy 16: Cryptography and Society 17: Closing Remarks
1: Preface to the Third Edition 2: Preface I Setting the Scene 3: Basic Principles 4: Historical Cryptosystems 5: Theoretical versus Practical Security II The Cryptographic Toolkit 6: Symmetric Encryption 7: Public-Key Encryption 8: Data Integrity 9: Entity Authentication III Implementation and Key Management 10: Implementation of Cryptography 11: Key Management 12: Management of Public Keys IV Use of Cryptography 13: Applications of Cryptography 14: Cryptography for Personal Devices 15: Cryptography for Privacy 16: Cryptography and Society 17: Closing Remarks
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497
USt-IdNr: DE450055826