Академический Документы
Профессиональный Документы
Культура Документы
cryptography:
Public
key
cryptography
In this document
See also
and
How
public
cryptography works
See also
key
See also
Crash course on
cryptography:
Security aspects
of cryptographic
systems
In this document
See also
Smart cards
See also
Key exchange
Implementation issues
Keeping
the
algorithm
implementation a secret
or
Crash course on
cryptography:
Digital
certificates
How
work
digital
certificates
Certificate chains
Crash course on
cryptography:
Digital signatures
In this document
How
work
digital
signatures
Cryptographic
functions
and
signatures
hash
digital
Applications of digital
signatures
See also
Digitale
Dutch)
handtekening
rechtsgeldig
(in
Digital
signatures
offer
many
applications other than signing
messages such as e-mail. A digital
signature can be created for any kind
of file. The digital signature then can
be used as proof that the file was not
modified after the digital signature
was created. It can also be used to
make the file unique, for example by
appending a serial number to the file
and signing the result.
Authenticating
servers
Web
See also
Timestamping services
Signed
programs
computer
See also
Crash course on
cryptography:
Secret
key
cryptography
In this document
See also
decryption
How
secret
cryptography works
key
Secret
key
cryptography
transforms
(scrambles) a message into something
resembling random noise. The precise
transformation is determined by the key.
Mathematically seen, a cryptographic
algorithm is a function that maps a message
onto a ciphertext (an encrypted message). By
using keys, it is possible to encrypt many
different messages using one particular
cryptographic algorithm in different ways.
And keeping the key a secret is much easier
than keeping a complete algorithm a secret.
Some cryptographic algorithms operate on
single characters of the message. These are
called stream ciphers. Others operate on
entire blocks, and therefore are called block
ciphers. Stream ciphers are easier to
implement in hardware than block ciphers,
and they are also generally faster. Block
ciphers tend to be harder to crack.
See also
One-time pads
Hiding spoilers
Encrypting
hard disks
the
contents
of
Protecting
transmissions
pay
TV