Crypto users' handbook : a guide for implementors of cryptographic protection in computer systems

Bibliographic Information

Crypto users' handbook : a guide for implementors of cryptographic protection in computer systems

prepared under the auspices of IFIP WG 11.4 [by] Per Christoffersson ... [et al.] ; Viiveke Fåk, editor

North-Holland , Sole distributors for the U.S.A. and Canada, Elsevier Science Pub. Co., 1988

  • U.S.

Available at  / 6 libraries

Search this Book/Journal

Note

Bibliography: p. 80-85

Includes index

Description and Table of Contents

Description

This tutorial is a guide for those who are considering installing - or have already installed - cryptographic protection in their computer systems. The reader should have a reasonable knowledge about computers and computer security problems in general. Although technical in nature, the specific vocabulary is explained in the text, and a glossary is provided. Containing facts and experience which must otherwise be collected from a great many sources, it covers why, when and how to use cryptography, the principles of and demands on cryptographic algorithms, key management, possible problems with communications protocols, and the current state of standardization in the field. It is aimed at those who want to learn about cryptographic protection in a computer environment without specializing in the field.

Table of Contents

1. Introduction (P. Mattila). 2. Applications. Confidentiality. Data Authentication. Authentication of Identity. Software Protection (S. Herda). 3. Algorithms. Introduction. Theoretical Security. Stream Ciphers and Block Ciphers. Examples of Attacks. Modes and Comparisons. Crypto Variables. Public Key Systems. Evaluation of Cryptographic Algorithms (K.-O. Widman) 4. Protecting the Protection. Key Management (W. Price). Crypto Environment (S.-A. Ekhall). 5. Encryption and Communication. Communication Principles. Encryption and the Communication Architecture. Practical Examples (P. Christoffersson). 6. Standards for Data Security (W. Price). 7. Encryption Implementations. Hardware. Software. Choosing an Implementation (V. Fak). 8. Glossary and Abbreviations. 9. References. Index.

by "Nielsen BookData"

Details

  • NCID
    BA05003269
  • ISBN
    • 0444704841
  • LCCN
    88019121
  • Country Code
    ne
  • Title Language Code
    eng
  • Text Language Code
    eng
  • Place of Publication
    Amsterdam [The Netherlands] ; New York,New York, N.Y., U.S.A.
  • Pages/Volumes
    vii, 93 p.
  • Size
    23 cm
  • Classification
  • Subject Headings
Page Top