Security without Obscurity: A Guide to Cryptographic Architectures

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Information security has a major gap when cryptography is implemented. Cryptographic algorithms are well defined, key management schemes are well known, but the actual deployment is typically overlooked, ignored, or unknown. Cryptography is everywhere. Application and network architectures are typically well-documented but the cryptographic architecture is missing. This book provides a guide to discovering, documenting, and validating cryptographic architectures. Each chapter builds on the next to present information in a sequential process. This approach not only presents the material in a structured manner, it also serves as an ongoing reference guide for future use.

Author(s): J. J. Stapleton
Edition: 1
Publisher: Auerbach Publications
Year: 2018

Language: English
Commentary: True PDF
Pages: 193
City: Boca Raton, FL
Tags: Security; Cryptography; Risk Management; Encryption; Hash Functions; Public-Key Cryptography; Cryptographic Protocols; Private-Key Cryptography