Abstract
So much has been said, and so much has been gained; thousands of lives have been lost, and empires have fallen because a secret was not kept. Efforts to keep secrets have been made by humans probably since the beginning of humanity itself. Long ago, humans discovered the essence of secrecy. The art of keeping secrets resulted in victories in wars and in growth of mighty empires. Powerful rulers learned to keep secrets and pass information without interception; that was the beginning of cryptography. Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing.” From its rather simple beginnings, cryptography has grown in tandem with technology, and its importance has also similarly grown. Just as in its early days, good cryptographic prowess still wins wars.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Stein,Lincoln, D. Web Security: A Step-by-Step Reference Guide. Boston, MA: Addison-Wesley, 1998.
Kaeo, Marike. Designing Network Security. Indianapolis: Cisco Press, 1999.
Stallings, William. Cryptography and Network Security: Principles and Practice. Second Edition. Upper Saddle River NJ: Prentice Hall, 1999.
Frame Technology. http://www.cs.nps.navy.mil/curricula/tracks/security/notes/chap05_33.html.
Key Distribution and Certification. http://cosmos.kaist.ac.kr/cs441/text/keydist.htm.
Panko, Raymond, R. Corporate Computer Security. Upper Saddle River NJ: Prentice Hall, 2004.
Certificates and Certificate Authorities. http://www-no.ucsd.edu/oldsecurity/Ca.html.
Ram and J. Honta. Keeping PKI Under Lock and Key. NetworkMagazine.com. http://www.networkmagazine.com/article/NMG20001004S0015.
Documentation on Cryptography: Message digests and digital signatures. http://pgp.rasip.fer.hr/pgpdoc2/pgpd2_50.html.
Public Key Digital Signatures. http://www.sei.cmu.edu/str/descriptions/pkds_body.html.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2013). Cryptography. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-4543-1_11
Download citation
DOI: https://doi.org/10.1007/978-1-4471-4543-1_11
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-4542-4
Online ISBN: 978-1-4471-4543-1
eBook Packages: Computer ScienceComputer Science (R0)