Using Encryption I: Theory


In this chapter, we have tried to survey the entire huge field of encryption and hashing algorithms available to PHP programmers.

We began by defining first encryption (both symmetric and asymmetric) and then hashing, and then we discussed algorithm strength.

The heart of the chapter was a survey of a whole series of algorithms, first for encryption (both symmetric and asymmetric), next for hashing, and finally for two related algorithms that are unsuitable for serious use. We tried in every case to give some sense of the history of an algorithm, its methods, and its availability.

After a discussion of random numbers, we turned to three other concepts involved in encryption: streams and blocks, modes, and initialization vectors. Finally, we touched on the important issue of governmental oversight over the use and export of encryption algorithms.

This chapter was groundwork for Chapter 6, where we will show how to put the best of the algorithms described here to practical use.


Encryption Algorithm Advance Encryption Standard Stream Cipher Cyclic Redundancy Check Encrypt Message 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Chris Snyder and Michael Southwell 2005

Personalised recommendations