Altough cryptography has a long history dating back at least as far as Julius Caesar, nodern cryptographic techniques,
including many of those used in the Internet, are based on advances made in the past 30 years. A detailed technical
discussion of cryptograhpy, particularly from a network standpoint, is [Kaufman 1995]. [Diffie 1998] provides a compelling
and up-to-date examination of the political and social issues that are now inextricably intertwined with cryptography.
A compelling discussion of cryptography itself requires a complete book [Kaufman 1995; Schneier 1995] and so we only touch
on the essential aspects of cryptography, particularly as they are practiced on the Internet.
Cryptographic techniques allow a sender to disguise daa so that an intruder can gain no information from the intercepted
data. The receiver must be able to recover the original data from the disguised data.
|