Читать книгу Information Security - Mark Stamp - Страница 45

2.8 Summary

Оглавление

In this chapter we covered several classic cryptosystems, including the simple substitution, the double transposition, codebooks, and the one‐time pad. Each of these illustrates some important points that weĺl return to again in later chapters. We also discussed some elementary aspects of cryptography and cryptanalysis.

In the next chapter weĺl turn our attention to modern symmetric key ciphers. Subsequent chapters cover public key cryptography, and hash functions. Cryptography will appear again in later parts of the book. In particular, crypto is a crucial ingredient in security protocols. Contrary to some author's misguided efforts, the fact is that thereś no avoiding cryptography in information security.

Information Security

Подняться наверх