Amazon cover image
Image from Amazon.com

User's guide to cryptography and standards

By: Contributor(s): Material type: TextTextLanguage: English Series: Artech House computer security libraryPublication details: Boston Artech House 2004Description: xv, 382 p. illISBN:
  • 1580535305 (HB)
Subject(s):
Contents:
1. Introduction 2. Standards and the standardization process 3. Security mechanisms and security services 4. Encryption 5. Modes of operation for block ciphers 6. Cryptographic hash functions 7. Message authentication codes (MACs) 8. Digital signatures 9. Non-repudiation mechanisms 10. Authentication protocols 11. Key management frameworks 12. Key establishment mechanisms 13. Public key infrastructures 14. Trusted third parties 15. Cryptographic APIs 16. Other standards 17. Standards : the future.
Summary: ith the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers hands-on knowledge of the latest and most important standardized cryptographic techniques that professionals can use to protect data and computing resources to the fullest. Rather than focusing on theory like other books, this resource describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques.
Item type: BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Home library Call number Materials specified Status Date due Barcode
IMSc Library 681 DUN (Browse shelf(Opens below)) Available 53160

Includes index

Includes bibliographical references

1. Introduction 2. Standards and the standardization process 3. Security mechanisms and security services 4. Encryption 5. Modes of operation for block ciphers 6. Cryptographic hash functions 7. Message authentication codes (MACs) 8. Digital signatures 9. Non-repudiation mechanisms 10. Authentication protocols 11. Key management frameworks 12. Key establishment mechanisms 13. Public key infrastructures 14. Trusted third parties 15. Cryptographic APIs 16. Other standards 17. Standards : the future.

ith the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers hands-on knowledge of the latest and most important standardized cryptographic techniques that professionals can use to protect data and computing resources to the fullest. Rather than focusing on theory like other books, this resource describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India