Cryptography

  • Uwe Hansmann
  • Martin S. Nicklous
  • Thomas Schäck
  • Frank Seliger

Abstract

In this chapter, we will give a brief introduction to cryptography, focusing on aspects that are important in conjunction with smart cards. We start by a short overview of the predominant cryptographic algorithms. Then we present commonly used cryptographic protocols for authentication and secure transmission of data and give some examples on how these protocols are used in the smart card area. Finally, we give an example for usage of smart cards to support cryptographic software on a PC. It shows how to use smart cards for private-key operations required by TLS (Transport Layer Security, the successor of SSL 3.0).

Keywords

Assure Exter 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer-Verlag Berlin Heidelberg 2000

Authors and Affiliations

  • Uwe Hansmann
    • 1
  • Martin S. Nicklous
    • 1
  • Thomas Schäck
    • 1
  • Frank Seliger
    • 1
  1. 1.IBM Deutschland Entwicklung GmbHBöblingenGermany

Personalised recommendations