Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem
This book is your ultimate resource for Encryption. Here you will find the most up-to-date information, analysis, background and everything you need to know.
In easy to read chapters, with extensive references and links to get you to know all there is to know about Encryption right away, covering: Encryption, Cryptography, Outline of cryptography, 1dl, Anonymous veto network, Array controller based encryption, Authenticated encryption, Authorization certificate, Autokey cypher, Avalanche effect, Averaging argument, Backdoor (computing), Bent function, Bigram, BLACKER, Blind credential, Blind signature, Blinding (cryptography), Block design, Block size (cryptography), Blom's scheme, BLS (cryptography), Blum-Micali algorithm, Boneh/Franklin scheme, Boolean function, Brown fox code, Burrows–Abadi–Needham logic, Bus encryption, Byzantine fault tolerance, Cardan grille, Chaocipher, Cipher, Cipher runes, User talk:Ciphergoth/One-time pad, Ciphertext, Ciphertext expansion, Ciphertext indistinguishability, Civision, Client-Side Encryption, Clipper chip, Cocks IBE scheme, Code (cryptography), Code word, Codebook, Codress message, Collision resistance, Commitment scheme, Communications security, Comparison of cryptographic hash functions, Completeness (cryptography), Compromise, Computer insecurity, Concrete security, Confusion and diffusion, Conjugate coding, Correlation attack, Correlation immunity, Cover (telecommunications), Cover-coding, Critical Security Parameter, Crypto-politics, Cryptochannel, Cryptographic engineering, Cryptographic hash function, Cryptographic nonce, Cryptographic Service Provider, Cryptographic Test Correction, Portal:Cryptography, CrypTool, Cryptosystem, Cryptovirology, Decipherment, Deniable encryption, Designated verifier signature, Deterministic encryption, Digital credential, Digital signature, Digital signature forgery, Dining cryptographers problem, Diplomatic bag, Direct Anonymous Attestation, Discrete logarithm, EFF DES cracker, Electronic signature, Elliptic curve cryptography, Encrypted function, End-to-end encryption, Enigma machine, Entropic security, Ephemeral key, Factorization of polynomials over a finite field and irreducibility tests, Feedback with Carry Shift Registers, File camouflage, Floradora, Forking lemma, Forward anonymity, Friend-to-friend, Generic group model, Group key, Group signature, Group-based cryptography, HashClash, Homomorphic encryption, Horton Principle, Hybrid cryptosystem, Hyper-encryption, ID-based cryptography, ID-based encryption, Ideal lattice cryptography, Index of coincidence, Information leakage, Initialization vector, Kerckhoffs's Principle, Key (cryptography), Key Ceremony, Key number method, Keyring (cryptography), Kish cypher, Kiss (cryptanalysis), Kleptography, Knapsack problem, KY-7, Lamport signature, Lattice-based cryptography, Lattice problem, Learning with errors... and much more.
This book explains in-depth the real drivers and workings of Encryption. It reduces the risk of your technology, time and resources investment decisions by enabling you to compare your understanding of Encryption with the objectivity of experienced professionals.