Note this material is not impacted by recent (Web) advances and so can be studied in "venerable" books such as:
|
Network Security: Private Communication in a Public World, Kaufman, Perlman and Speciner, Prentice Hall 1995
|
Web leads to important new applications of security mathematics and nifty pure mathematics is making progress in cracking longer and longer keys
|
We discuss Secret Key Technology and Public Key Technology with applications to
-
Transmission over insecure media
-
Digital signatures
-
Message Integrity
|