Secure Communications And Asymmetric Cryptosystems (e-bog) af Simmons, Gustavus
Simmons, Gustavus (forfatter)

Secure Communications And Asymmetric Cryptosystems e-bog

449,29 DKK (ekskl. moms 359,43 DKK)
Secure message transmission is of extreme importance in today's information-based society: military, diplomatic, and corporate data transmissions must be safeguarded; so also must the account of every individual who has an automatic-teller bank account or whose purchases are subject to point-of-sale, direct account debiting. The only known way to keep all such transactions secret and authentic is…
Secure message transmission is of extreme importance in today's information-based society: military, diplomatic, and corporate data transmissions must be safeguarded; so also must the account of every individual who has an automatic-teller bank account or whose purchases are subject to point-of-sale, direct account debiting. The only known way to keep all such transactions secret and authentic is by way of cryptographic techniques. But most cryptosystems in use today are not fool-proof-- their "e;symmetric"e; nature allows them to be compromised if either the sender's or the receiver's "e;key"e; (decoding algorithm) falls into the wrong hands. This book reports on the enormous amount of work that has been done in the past on the concept, "e;asymmetric"e; cryptography.
E-bog 449,29 DKK
Forfattere Simmons, Gustavus (forfatter)
Forlag Routledge
Udgivet 05.09.2019
Længde 338 sider
Genrer JF
Sprog English
Format epub
Beskyttelse LCP
ISBN 9781000311037
Secure message transmission is of extreme importance in today's information-based society: military, diplomatic, and corporate data transmissions must be safeguarded; so also must the account of every individual who has an automatic-teller bank account or whose purchases are subject to point-of-sale, direct account debiting. The only known way to keep all such transactions secret and authentic is by way of cryptographic techniques. But most cryptosystems in use today are not fool-proof-- their "e;symmetric"e; nature allows them to be compromised if either the sender's or the receiver's "e;key"e; (decoding algorithm) falls into the wrong hands. This book reports on the enormous amount of work that has been done in the past on the concept, "e;asymmetric"e; cryptography.