Abstract
Cryptography lies at the heart of all cybersecurity technologies, and appreciating the role it plays is vital to understanding how to secure cyberspace. In this chapter, we review the basic tools provided by cryptography and how they are used to provide the core security services of confidentiality, data integrity, and entity authentication in cyberspace.
References
Ferguson N, Schneier B, Kohno T (2010) Cryptography engineering. Wiley, Indianapolis
Martin KM (2017) Everyday cryptography, 2nd edn. Oxford University Press, Oxford
Paar C, Pelzl J (2011) Understanding cryptography. Springer, Heidelberg Dordrecht London New York
Piper F, Murphy S (2002) Cryptography: a very short introduction. Oxford University Press, Oxford
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Section Editor information
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG, part of Springer Nature
About this entry
Cite this entry
Martin, K.M. (2018). Cryptographic Controls: The Heart of Cybersecurity. In: Masys, A. (eds) Handbook of Security Science. Springer, Cham. https://doi.org/10.1007/978-3-319-51761-2_62-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-51761-2_62-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-51761-2
Online ISBN: 978-3-319-51761-2
eBook Packages: Springer Reference Physics and AstronomyReference Module Physical and Materials ScienceReference Module Chemistry, Materials and Physics