Logo

An introduction to Cryptography

Small book cover: An introduction to Cryptography

An introduction to Cryptography
by


Number of pages: 80

Description:
This guide describes how to use PGP (Pretty Good Privacy) to securely manage your organization’s messages and data storage. The book provides an overview of the terminology and concepts you will encounter as you use PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography.

Download or read it online for free here:
Download link
(0.8MB, PDF)

Similar books

Book cover: Cryptography: An IntroductionCryptography: An Introduction
by - McGraw-Hill
Nigel Smart's 'Cryptography' provides the rigorous detail required for advanced cryptographic studies, yet approaches the subject matter in an accessible style in order to gently guide new students through difficult mathematical topics.
(8313 views)
Book cover: Cracking Codes with PythonCracking Codes with Python
by - inventwithpython.com
The book teaches complete beginners how to program in the Python programming language. It features the source code to several ciphers and hacking programs for these ciphers. The final chapters cover the modern RSA cipher and public key cryptography.
(7088 views)
Book cover: Mathematical CryptologyMathematical Cryptology
by - Tampere University of Technology
These notes contain the central mathematical background needed for understanding modern data encryption methods, and introduce applications in cryptography and various protocols. The fledgling quantum cryptography is briefly introduced.
(10458 views)
Book cover: A Graduate Course in Applied CryptographyA Graduate Course in Applied Cryptography
by - cryptobook.us
This book is about constructing practical cryptosystems for which we can argue security under plausible assumptions. The book covers many constructions for different tasks in cryptography. For each task we define a precise security goal ...
(2577 views)