IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Introduction to Cryptography

Introduction to Cryptography
View Sample PDF
Author(s): Rajeeva Laxman Karandikar (Indian Statistical Institute, India)
Copyright: 2009
Pages: 14
Source title: Selected Readings on Information Technology Management: Contemporary Issues
Source Author(s)/Editor(s): George Kelley (University of Massachusetts-Boston, USA)
DOI: 10.4018/978-1-60566-092-9.ch011

Purchase

View Introduction to Cryptography on the publisher's website for pricing and purchasing information.

Abstract

The chapter introduces the reader to various key ideas in cryptography without going into technicalities. It brings out the need for use of cryptography in electronic communications, and describes the symmetric key techniques as well as public key cryptosystems. Digital signatures are also discussed. Data integrity and data authentication are also discussed.

Related Content

Tereza Raquel Merlo, Nayana Madali M. Pampapura, Jason M. Merlo. © 2024. 14 pages.
Kris Swen Helge. © 2024. 9 pages.
Ahmad Tasnim Siddiqui, Gulshaira Banu Jahangeer, Amjath Fareeth Basha. © 2024. 12 pages.
Jennie Lee Khun. © 2024. 19 pages.
Tereza Raquel Merlo. © 2024. 19 pages.
Akash Bag, Paridhi Sharma, Pranjal Khare, Souvik Roy. © 2024. 31 pages.
Akash Bag, Upasana Khattri, Aditya Agrawal, Souvik Roy. © 2024. 28 pages.
Body Bottom