Feineigle.com - encryption

Home · Tags · Encryption



Cryptography and Network Security Principles and Practice

2018-03-02
Tags:  Encryption · Math · Programming
After a brief introduction to historical cryptography, a quick and dirty crash course of the mathematics required to understand most of the book is presented. Various cypher types, or modes, are discussed, including block, stream, chain, feedback, and counter in addition to symmetric/asymmetric cyphers, public/private key encryption and exchange, particular attention is paid to the Diffie-Hellman method of exchange. Some of the cryptographic algorithms covered include DES, AES, and RSA; these are presented alongside various hashing algorithms and it is explained how the use of certain combinations of these tools can provide, integrity, confidentiality, authentication, or any combination of these to data. The cryptographic section concludes with a pair of chapters on trust/key management, and user authentication to close a decidedly well rounded and complete examination of the aforementioned topics. The network security portion of the book covers everything from transport layer security like HTTPS and SSH, wireless security, email security, and includes a final chapter on IP security.






Algorithms Animals Apache Army Artificial-Intelligence Bash Bitcoin Boycott Cia Communication Computer Conspiracy-Theory Creativity Css Culture Cybernetics Database Demographics Desk Drugs Eclipse Economics Education Electronics Encryption Ergonomic Evolution Family Fiction Firefox Flask Fpga Furniture Games Garden Git Godot Graph Gui Hacking Hardware Health Hiking History Html Immigration Java Json Lgbt Linux Machine-Learning Math Matplotlib Military Music Neo4j Notes Numpy Occult Oligarchy Pedophilia Permaculture Philosophy Physics Politics Posture Programming Propaganda Protest Psychology Psyop Python Rabbits Regex Religion Research Sci-Fi Scipy Sleep Software Sqlite Suicide Technology Travel Vhdl Vim Waterfall Woodworking Writing