Formal Languages and Applications pp 599-620 | Cite as
Cryptography: Basic Theory and Practice
Chapter
Summary
We present fundamental notions of cryptology and explain how they are used in the context of information and communication security. Both symmetric and asymmetric technologies are covered, as well as basic security protocols. We also cover practical aspects throughout the text. As a large example we describe how cryptographic methods are used in securing mobile communications in cellular networks.
Keywords
Hash Function Block Cipher Mutual Authentication Stream Cipher Message Authentication Code
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Preview
Unable to display preview. Download preview PDF.
References
- 1.Menezes, A., van Oorschot, P., and Vanstone S.: Handbook of Applied Cryptography, CRC Press (1997)Google Scholar
- 2.Niemi, V. and Nyberg, K.: UMTS security,John Wiley und sons (to appear).Google Scholar
- 3.Salomaa, A.: Public-Key Cryptography, Second Edition, Springer (1996).MATHGoogle Scholar
- 4.Simmons, G. (ed.): Contemporary Cryptology: The Science of Information Integrity, IEEE Press (1992).Google Scholar
- 5.Stinson, D.: Cryptography: Theory and Practice, Second Edition, CRC Press (2002).Google Scholar
Copyright information
© Springer-Verlag Berlin Heidelberg 2004