The RSA Security's Official Guide to Cryptography

  • Authors:
  • Steve Burnett;Stephen Paine

  • Affiliations:
  • -;-

  • Venue:
  • The RSA Security's Official Guide to Cryptography
  • Year:
  • 2001

Quantified Score

Hi-index 0.00

Visualization

Abstract

From the Publisher:Want to keep your Web site safe? Learn how to implement cryptography,the most secure form of data encryption. Highly accessible,and packed with detailed case studies,this practical guide is written in conjunction with RSA Security—the most trusted name in e-security(tm). Part of the RSA Press Series. Learn how cryptography works—from the leading authority in e-security. Cryptography is one of the smartest ways to protect the information on your network and reduce the risk of security breaches and attacks from hackers. And because implementing cryptography is a complex process,you need the practical advice and proven techniques contained inside this official guide. Written by insiders at RSA Security,this expert resource explains the differences between symmetric-key and public-key cryptography,how PKI and X. 509 affect security,how the RSA algorithm works within protocols,and much more. You'll also read actual case-studies detailing different types of security vulnerabilities and what types of cryptography applications would prevent attacks. This book will show you how to:Distinguish different types of symmetric-key encryption algorithms and know where each is best usedFind out how password-based encryption worksCommunicate safely over unsecure channels using public-key technologyUse public-key technology for authentication and non-repudiationGet details on current PKI standards and technology—including vendor information Understand X. 509 certificates and directory structuresGet an operational overview of widely-used protocols—including IPSec,SSL,and SETRecognize how corporations use cryptography toimprove security through real-world case studiesView cryptography from different perspectives—corporations,developers,and usersEffectively use digital signatures and hardware solutions—smart cards,tokens,key storage devices,and moreImprove security and protect your company's information with the most authoritative guide to cryptography available.