Abstract
So much has been said and so much has been gained; thousands of lives have been lost, and empires have fallen because a secret was not kept. Efforts to keep secrets have been made by humans probably since the beginning of humanity itself. Long ago, humans discovered the essence of secrecy. The art of keeping secrets resulted in victories in wars and in growth of mighty empires. Powerful rulers learned to keep secrets and pass information without interception; that was the beginning of cryptography. Although the basic concepts of cryptography predate the Greeks, the present word cryptography, used to describe the art of secret communication, comes from the Greek meaning “secret writing.” From its rather simple beginnings, cryptography has grown in tandem with technology, and its importance has also similarly grown. Just as in its early days, good cryptographic prowess still wins wars.
Keywords
- Hash Function
- Block Cipher
- Advance Encryption Standard
- Certificate Authority
- Message Authentication Code
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Stein LD (1998) Web security: a step-by-step reference guide. Addison-Wesley, Boston
Kaeo M (1999) Designing network security. Cisco Press, Indianapolis
Stallings W (1999) Cryptography and network security: principles and practice, 2nd edn. Prentice Hall, Upper Saddle River
Frame Technology. http://www.cs.nps.navy.mil/curricula/tracks/security/notes/chap05_33.html
Key Distribution and Certification. http://cosmos.kaist.ac.kr/cs441/text/keydist.htm
Panko RR (2004) Corporate computer security. Prentice Hall, Upper Saddle River
Certificates and Certificate Authorities. http://www-no.ucsd.edu/oldsecurity/Ca.html
Ram Honta J, Keeping PKI under lock and key. NetworkMagazine.com. http://www.networkmagazine.com/article/NMG20001004S0015
Documentation on cryptography: message digests and digital signatures. http://pgp.rasip.fer.hr/pgpdoc2/pgpd2_50.html
Public Key Digital Signatures. http://www.sei.cmu.edu/str/descriptions/pkds_body.html
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer-Verlag London
About this chapter
Cite this chapter
Kizza, J.M. (2015). Cryptography. In: Guide to Computer Network Security. Computer Communications and Networks. Springer, London. https://doi.org/10.1007/978-1-4471-6654-2_11
Download citation
DOI: https://doi.org/10.1007/978-1-4471-6654-2_11
Published:
Publisher Name: Springer, London
Print ISBN: 978-1-4471-6653-5
Online ISBN: 978-1-4471-6654-2
eBook Packages: Computer ScienceComputer Science (R0)