• Complain

Keith Martin - Everyday Cryptography: Fundamental Principles and Applications

Here you can read online Keith Martin - Everyday Cryptography: Fundamental Principles and Applications full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Oxford University Press, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Everyday Cryptography: Fundamental Principles and Applications
  • Author:
  • Publisher:
    Oxford University Press
  • Genre:
  • Year:
    2017
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Everyday Cryptography: Fundamental Principles and Applications: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Everyday Cryptography: Fundamental Principles and Applications" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, payment cards, Tor, and Bitcoin.
This book is intended to be introductory, self-contained, and widely accessible. It is suitable as a first read on cryptography. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematics techniques underpinning cryptographic mechanisms. Instead our focus will be on what a normal user or practitioner of information security needs to know about cryptography in order to understand the design and use of everyday cryptographic applications.
By focusing on the fundamental principles of modern cryptography rather than the technical details of current cryptographic technology, the main part this book is relatively timeless, and illustrates the application of these principles by considering a number of contemporary applications of cryptography. Following the revelations of former NSA contractor Edward Snowden, the book considers the wider societal impact of use of cryptography and strategies for addressing this.
A reader of this book will not only be able to understand the everyday use of cryptography, but also be able to interpret future developments in this fascinating and crucially important area of technology.

Keith Martin: author's other books


Who wrote Everyday Cryptography: Fundamental Principles and Applications? Find out the surname, the name of the author of the book and a list of all author's works by series.

Everyday Cryptography: Fundamental Principles and Applications — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Everyday Cryptography: Fundamental Principles and Applications" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Everyday Cryptography

Everyday Cryptography

Fundamental Principles and Applications

SECOND EDITION

KEITH M. MARTIN

Everyday Cryptography Fundamental Principles and Applications - image 1

Everyday Cryptography Fundamental Principles and Applications - image 2

Great Clarendon Street, Oxford, OX2 6DP, United Kingdom

Oxford University Press is a department of the University of Oxford. It furthers the Universitys objective of excellence in research, scholarship, and education by publishing worldwide. Oxford is a registered trade mark of Oxford University Press in the UK and in certain other countries

Keith Martin 2017

The moral rights of the author have been asserted

First Edition published in 2012

Second Edition published in 2017

Impression: 1

All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, without the prior permission in writing of Oxford University Press, or as expressly permitted by law, by licence or under terms agreed with the appropriate reprographics rights organization. Enquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above

You must not circulate this work in any other form and you must impose this same condition on any acquirer

Published in the United States of America by Oxford University Press 198 Madison Avenue, New York, NY 10016, United States of America

British Library Cataloguing in Publication Data

Data available

Library of Congress Control Number: 2017938463

ISBN 9780191092060(ebook.)

ISBN 9780198788010(pbk.)

Printed and bound by

CPI Litho (UK) Ltd, Croydon, CR0 4YY

Links to third party websites are provided by Oxford in good faith and for information only. Oxford disclaims any responsibility for the materials contained in any third party website referenced in this work.

When this book was first published in 2012, it was argued to be relatively timeless and hence would be just as relevant in 2022 as it would have been in 2002. This is because the focus was on fundamental principles and not the latest technology. So, is a second edition really needed?

I stand by the initial statement, so one answer is that a second edition is not strictly needed. The fundamental principles behind cryptography have not changed. Indeed, there has been relatively little change in the most common cryptographic algorithms used to implement these principles, so most of the cryptographic toolkit presented in the first edition remains the same. However, there are reasons why a new edition of Everyday Cryptography is merited.

The last part of the book illustrates the underlying principles by examining how cryptography is used in some everyday applications. There have inevitably been developments to these applications since 2012, several of which have resulted in changes to the cryptography used within them. The second edition thus presents an opportunity to update this material. In addition, some further details about some of the cryptographic tools used to support them have been provided. The new material includes discussion of TLS 1.3, LTE, and Apple Pay.

However, the most significant development since 2012 is that there is now a much greater awareness of cryptography throughout society. This has arisen from a very public debate about use of cryptography following the revelations by former US Government contractor Edward Snowden in 2013, which revealed a great deal of information about how the use of cryptography has been controlled by government agencies.

Society has always been faced with a dilemma when it comes to the use of cryptography. The tensions between provision of privacy and a desire for targeted surveillance have existed for decades, and are ongoing. Snowdens revelations relating to this are just the latest twist in an old story. The first edition of Everyday Cryptography made only passing reference to this issue. This second edition devotes an entire chapter to the control of cryptography. This chapter presents the dilemma posed by cryptography and discusses strategies and implications of attempts to address it. Note that it is not our intention to either cast judgement or propose resolution.

There is no doubt that one of the impacts of the Snowden revelations has been a greater interest in the use of cryptography. This second edition reflects this by extending the set of illustrative cryptographic applications to include two that have had a relatively high profile since 2012. The first is Tor, which uses cryptography to create a network providing a degree of anonymity for its users. The second is the digital currency Bitcoin.

Since 2012, we have also seen more cryptographic protection being offered by a range of consumer devices. In recognition of this, a new chapter has been dedicated to cryptography for personal devices. This discusses the use of cryptography to protect files, disks, email, and messaging on devices such as mobile phones. It includes case studies of technologies such as WhatsApp and iOS.

I would like to thank the following people who shared their personal expertise and took time to review the changes made to this new edition of Everyday Cryptography: James Alderman, Tom Atkinson, Ela Berners-Lee, Giovanni Cherubin, Danny De Cock, Jason Crampton, Ben Curtis, Matthew Dodd, Thalia Laing, David Main, Sarah Meiklejohn, Frederik Mennes, Steven Murdoch, Kenny Paterson, Nick Robinson, Thyla van der Merwe, and Mike Ward.

The importance of cryptography and its role in our everyday lives has never been greater. This second edition of Everyday Cryptography explains both why and how.

Cryptography is a subject whose relevance to everyday life has undergone a dramatic transformation. Cryptography used to manifest itself in the public imagination through its historical use, primarily to protect military communications, and through recreational puzzles. However, largely due to the development of computer networks, particularly the Internet, most of us now use cryptography on a daily basis.

Cryptography is fundamental to the provision of a wider notion of information security. Electronic information can easily be transmitted and stored in relatively insecure environments. This has resulted in fundamental changes to the risks to which information is exposed. As the financial impact of information security incidents rises, so does the need for information security protection and control. Cryptography is a vital technology which underpins many of these controls. It provides a suite of basic mechanisms for implementing the security services that protect electronic information, such as confidentiality, data integrity, and authentication. Cryptography does not secure information on its own, but many technical mechanisms for protecting information have cryptography at their core.

Cryptography is thus an important subject for anyone with an interest in information security. Other reasons for the wide interest in cryptography as a subject are that:

Cryptography plays an interesting political role. It is a key technology during times of conflict. Its modern use presents society with several intriguing moral and political dilemmas.

Cryptography has a wide intrinsic appeal to the general public. Many people are fascinated by secrets and codes. This has been successfully exploited by the mainstream media.

Who should read this book?

There have been many books written about cryptography, but what distinguishes the approach taken in this book is the combination of the following:

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Everyday Cryptography: Fundamental Principles and Applications»

Look at similar books to Everyday Cryptography: Fundamental Principles and Applications. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Everyday Cryptography: Fundamental Principles and Applications»

Discussion, reviews of the book Everyday Cryptography: Fundamental Principles and Applications and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.