Cryptography: Basic Theory and Practice

  • Valtteri Niemi
Part of the Studies in Fuzziness and Soft Computing book series (STUDFUZZ, volume 148)

Summary

We present fundamental notions of cryptology and explain how they are used in the context of information and communication security. Both symmetric and asymmetric technologies are covered, as well as basic security protocols. We also cover practical aspects throughout the text. As a large example we describe how cryptographic methods are used in securing mobile communications in cellular networks.

Keywords

Hash Function Block Cipher Mutual Authentication Stream Cipher Message Authentication Code 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Menezes, A., van Oorschot, P., and Vanstone S.: Handbook of Applied Cryptography, CRC Press (1997)Google Scholar
  2. 2.
    Niemi, V. and Nyberg, K.: UMTS security,John Wiley und sons (to appear).Google Scholar
  3. 3.
    Salomaa, A.: Public-Key Cryptography, Second Edition, Springer (1996).MATHGoogle Scholar
  4. 4.
    Simmons, G. (ed.): Contemporary Cryptology: The Science of Information Integrity, IEEE Press (1992).Google Scholar
  5. 5.
    Stinson, D.: Cryptography: Theory and Practice, Second Edition, CRC Press (2002).Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Valtteri Niemi
    • 1
  1. 1.Nokia Research CenterNOKIA GROUPFinland

Personalised recommendations