Security in Computer Networks

8.2 Principles of Cryptography

Home | Introduction | 8.1 What Is Network Security? | 8.2 Principles of Cryptography | 8.3 Authentication | 8.4 Integrity | 8.5 Key Distribution and Certification | 8.6 Access Control: Firewalls | 8.7 Attacks and Countermeasures | 8.8 Security in Many Layers: Case Studies

Altough cryptography has a long history dating back at least as far as Julius Caesar, nodern cryptographic techniques, including many of those used in the Internet, are based on advances made in the past 30 years.  A detailed technical discussion of cryptograhpy, particularly from a network standpoint, is [Kaufman 1995].  [Diffie 1998] provides a compelling and up-to-date examination of the political and social issues that are now inextricably intertwined with cryptography.  A compelling discussion of cryptography itself requires a complete book [Kaufman 1995; Schneier 1995] and so we only touch on the essential aspects of cryptography, particularly as they are practiced on the Internet.
 
Cryptographic techniques allow a sender to disguise daa so that an intruder can gain no information from the intercepted data.  The receiver must be able to recover the original data from the disguised data.

8.2.1 Symmetric Key Cryptography

8.2.2 Public Key Encryption