Synopses & Reviews
Presents the theory and methodology for implementing a useable security system. Covers applications in the fields of data communications, data processing, and data storage.
Table of Contents
The role of Cryptography in Electronic Data Processing.
Block Ciphers and Stream Ciphers.
The Data Encryption Standard.
Communication Security and File Security Using Cryptography.
The Host System Cryptographic Operations.
Generation, Distribution, and Installation of Cryptographic Keys.
Incorporation of Cryptography into a Communications Architecture.
Authentication Techniques Using Cryptography.
Digital Signatures.
Applying Cryptography to PIN-Based Electronic Funds Transfer Systems.
Applying Cryptography to Electronic Funds Transfer Systems - Personal Identification Numbers and Personal Keys.
Measures of Secrecy for Cryptographic Systems.