An Overview of Cryptography


46 bookmarks. First posted by kenbauer september 2018.


This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. (See Section A.4 for some additional commentary on this...)
cryptography  books  reference 
3 days ago by tncowart
© 1998-2019 — A much shorter version of this paper first appeared in Handbook on Local Area Networks (Auerbach, Sept. 1998). Since that time, this paper has taken on a life of its own...
books  crypto  cryptography  reference 
3 days ago by wjy
via Pinboard (Popular items from Pinboard) https://pinboard.in/popular/
IFTTT  Feedly 
5 days ago by sbmandal
An Overview of Cryptography

Gary C. Kessler

14 August 2019

© 1998-2019 — A much shorter version of this paper first appeared in Handbook on Local Area Networks (Auerbach, Sept. 1998). Since that time, this paper has taken on a life of its own...
cryptography  books  reference 
6 days ago by euler
An Overview of Cryptography Gary C. Kessler 14 August 2019 © 1998-2019 — A much shorter version of this paper first appeared in Handbook on Local Area Networks (Auerbach, Sept. 1998). Since that time, this paper has taken on a life of its own... CONTENTS 1. INTRODUCTION 2.
Archive 
6 days ago by plouf
An Overview of Cryptography ()
from twitter_favs
6 days ago by michaeltri
Does increased security provide comfort to paranoid people? Or does security provide some very basic protections that we are naive to believe that we don't need? During this time when the Internet provides essential communication between literally billions of people and is used as a tool for commerce, social interaction, and the exchange of an increasing amount of personal information, security has become a tremendously important issue for every user to deal with.

There are many aspects to security and many applications, ranging from secure commerce and payments to private communications and protecting health care information. One essential aspect for secure communications is that of cryptography. But it is important to note that while cryptography is necessary for secure communications, it is not by itself sufficient. The reader is advised, then, that the topics covered here only describe the first of many steps necessary for better security in any number of situations.

This paper has two major purposes. The first is to define some of the terms and concepts behind basic cryptographic methods, and to offer a way to compare the myriad cryptographic schemes in use today. The second is to provide some real examples of cryptography in use today. (See Section A.4 for some additional commentary on this...)
cryptography  training  paper  read 
6 days ago by jonseager