An Overview of Cryptography 密码学概述

来源:互联网 发布:发如雪 知乎 编辑:程序博客网 时间:2024/05/21 20:29

关于密码学的非常好的文章

 

 

http://www.garykessler.net/library/crypto.html

 

 

An Overview of Cryptography

Gary C. Kessler
25 January 2013


A much shorter, edited version of this paper appears in the 1999 Edition of Handbook on Local Area Networks, published by Auerbach in September 1998. Since that time, this paper has taken on a life of its own...


CONTENTS

    1. INTRODUCTION
    2. THE PURPOSE OF CRYPTOGRAPHY
    3. TYPES OF CRYPTOGRAPHIC ALGORITHMS

      3.1. Secret Key Cryptography
      3.2. Public-Key Cryptography
      3.3. Hash Functions
      3.4. Why Three Encryption Techniques?
      3.5. The Significance of Key Length

    4. TRUST MODELS

      4.1. PGP Web of Trust
      4.2. Kerberos
      4.3. Public Key Certificates and Certification Authorities
      4.4. Summary

    5. CRYPTOGRAPHIC ALGORITHMS IN ACTION

      5.1. Password Protection
      5.2. Some of the Finer Details of Diffie-Hellman Key Exchange
      5.3. Some of the Finer Details of RSA Public-Key Cryptography
      5.4. Some of the Finer Details of DES, Breaking DES, and DES Variants
      5.5. Pretty Good Privacy (PGP)
      5.6. IP Security (IPsec) Protocol
      5.7. The SSL Family of Secure Transaction Protocols for the World Wide Web
      5.8. Elliptic Curve Cryptography
      5.9. The Advanced Encryption Standard and Rijndael
      5.10. Cisco's Stream Cipher
      5.11. TrueCrypt
      5.12. Encrypting File System

    6. CONCLUSION... OF SORTS
    7. REFERENCES AND FURTHER READING
    A. SOME MATH NOTES

      A.1. The Exclusive-OR (XOR) Function
      A.2. The modulo Function

    ABOUT THE AUTHOR
    ACKNOWLEDGEMENTS

 

 

 

原创粉丝点击