Cryptography Digital signatures, Digital signatures are the public-key primitives of message authentication. In the physical world, it is common to use handwritten signatures on handwritten or …Read More
Public Key Infrastructure, The most distinct feature of Public Key Infrastructure (PKI) is that it uses a pair of keys to achieve the underlying security service. The key pair comprises o…Read More
Cryptography Benefits & Drawbacks, Nowadays, the networks have gone global and information has taken the digital form of bits and bytes. Critical information now gets stored, processed and transm…Read More
Cryptography Hash functions, Hash functions are extremely useful and appear in almost all information security applications.…Read More
Message Authentication, In the last chapter, we discussed the data integrity threats and the use of hashing technique to detect if any modification attacks have taken place on the data…Read More
Public Key Encryption, Unlike symmetric key cryptography, we do not find historical use of public-key cryptography. It is a relatively new concept.…Read More
Data Integrity in Cryptography, Until now, we discussed the use of symmetric and public key schemes to achieve the confidentiality of information. With this chapter, we begin our discussion on…Read More
Data Encryption Standard, The Data Encryption Standard (DES) is a symmetric-key block cipher published by the National Institute of Standards and Technology (NIST).…Read More
Triple DES, The speed of exhaustive key searches against DES after 1990 began to cause discomfort amongst users of DES. However, users did not want to replace DES as it tak…Read More
Advanced Encryption Standard, The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It is found at l…Read More