Logo

An introduction to Cryptography

Small book cover: An introduction to Cryptography

An introduction to Cryptography
by


Number of pages: 80

Description:
This guide describes how to use PGP (Pretty Good Privacy) to securely manage your organization’s messages and data storage. The book provides an overview of the terminology and concepts you will encounter as you use PGP products. It contains discussions of security, privacy, and the vulnerabilities inherent in any security system, even PGP. This guide is useful to anyone who is interested in knowing the basics of cryptography, and explains the terminology and technology you will encounter as you use PGP products. You will find it useful to read before you begin working with cryptography.

Download or read it online for free here:
Download link
(0.8MB, PDF)

Similar books

Book cover: The Laws of Cryptography with Java CodeThe Laws of Cryptography with Java Code
by - Univ. of Texas San Antonio
The author is trying to find a middle ground, a gentle introduction to selected topics in cryptography without avoiding the mathematics. The material is aimed at undergraduate computer science students, but will be accessible to many others.
(7860 views)
Book cover: Coding Theory and CryptographyCoding Theory and Cryptography
by - Springer
This book concerns elementary and advanced aspects of coding theory and cryptography. The coding theory contributions deal mostly with algebraic coding theory. There are both historical and mathematical papers on cryptography.
(9989 views)
Book cover: Cryptography, A Study on Secret WritingsCryptography, A Study on Secret Writings
by - Aegean Park Press
A classic in cryptographic literature. Text is divided into parts: Descriptions of the principal systems of cryptography; Examples of deciphering (cryptanalysis); Lists and tables with bibliography; plus a section titled 'The Playfair Cipher'.
(16011 views)
Book cover: Advances in Cryptology - CRYPTO'96Advances in Cryptology - CRYPTO'96
by - Springer
Contents: Universal Hashing and Multiple Authentication; Asymmetric Cryptography with a Hidden Monomial; Hidden Collisions on DSS; All Bits in ax + b mod p are Hard; Robust and Efficient Sharing of RSA Functions; Improved Differential Attacks on RC5.
(3928 views)