Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Introduction to Cryptography

Introduction to Cryptography
View Sample PDF
Author(s): Rajeeva Laxman Karandikar (Indian Statistical Institute, India)
Copyright: 2009
Pages: 14
Source title: Selected Readings on Information Technology Management: Contemporary Issues
Source Author(s)/Editor(s): George Kelley (University of Massachusetts-Boston, USA)
DOI: 10.4018/978-1-60566-092-9.ch011


View Introduction to Cryptography on the publisher's website for pricing and purchasing information.


The chapter introduces the reader to various key ideas in cryptography without going into technicalities. It brings out the need for use of cryptography in electronic communications, and describes the symmetric key techniques as well as public key cryptosystems. Digital signatures are also discussed. Data integrity and data authentication are also discussed.

Related Content

Christine Kosmopoulos. © 2022. 22 pages.
Melkamu Beyene, Solomon Mekonnen Tekle, Daniel Gelaw Alemneh. © 2022. 21 pages.
Rajkumari Sofia Devi, Ch. Ibohal Singh. © 2022. 21 pages.
Ida Fajar Priyanto. © 2022. 16 pages.
Murtala Ismail Adakawa. © 2022. 27 pages.
Shimelis Getu Assefa. © 2022. 17 pages.
Angela Y. Ford, Daniel Gelaw Alemneh. © 2022. 22 pages.
Body Bottom