Summary
We present fundamental notions of cryptology and explain how they are used in the context of information and communication security. Both symmetric and asymmetric technologies are covered, as well as basic security protocols. We also cover practical aspects throughout the text. As a large example we describe how cryptographic methods are used in securing mobile communications in cellular networks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Menezes, A., van Oorschot, P., and Vanstone S.: Handbook of Applied Cryptography, CRC Press (1997)
Niemi, V. and Nyberg, K.: UMTS security,John Wiley und sons (to appear).
Salomaa, A.: Public-Key Cryptography, Second Edition, Springer (1996).
Simmons, G. (ed.): Contemporary Cryptology: The Science of Information Integrity, IEEE Press (1992).
Stinson, D.: Cryptography: Theory and Practice, Second Edition, CRC Press (2002).
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Niemi, V. (2004). Cryptography: Basic Theory and Practice. In: MartÃn-Vide, C., Mitrana, V., Păun, G. (eds) Formal Languages and Applications. Studies in Fuzziness and Soft Computing, vol 148. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-39886-8_31
Download citation
DOI: https://doi.org/10.1007/978-3-540-39886-8_31
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-53554-3
Online ISBN: 978-3-540-39886-8
eBook Packages: Springer Book Archive