Abstract
In modern cryptology, there are some basic mechanisms, which are essential to achieve security in distributed systems and hence in e-postage systems. We introduce these mechanisms at a conceptual level, which explains their security properties and how their cryptographic keys, if any, shall be managed. This will prepare our understanding of the existing e-postage systems in Chapter 6 on page 127, Chapter 7 on page 167 and the particular threats that apply to these systems (see Chapter 8 on page 183). Readers who are interested in a more detailed description and analysis of these mechanisms are referred to the Handbook of Applied Cryptography of Menezes, Oorschot and Vanstone [54], the Encyclopedia of Security and Cryptography of van Tilborg [74], or the reference work Applied Cryptography by Schneier [70].
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). Cryptography Primer. In: Electronic Postage Systems. Advances in Information Security, vol 26. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-44606-6_4
Download citation
DOI: https://doi.org/10.1007/978-0-387-44606-6_4
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-29313-4
Online ISBN: 978-0-387-44606-6
eBook Packages: Computer ScienceComputer Science (R0)
