IT543: Cryptography Concepts and Techniques
Unit 1: Introduction to Cryptography
There is an excellent list of acronyms and abbreviations in Appendix A of the
Cryptography and Public Key Infrastructure on the Internet text. In addition, you shou
04_Part_01_Cryptography.fm Page 1 Tuesday, March 18, 2003 9:05 AM
Why cryptography on
04_Part_01_Cryptography.fm Page 2 Tuesday, March 18, 2003 9:05 AM
Part 1: Why cryptography on the Internet?
Encryption machine HX-63, 1963 Model
06_Chap_02_Cryptography.fm Page 9 Wednesday, March 19, 2003 2:58 PM
What is cryptography
and why is it so
There is no security, only more or less insecurity.
Key experience no: 2
One of the oldest known examples of the use of cr
07_Chap_03_Cryptography.fm Page 19 Tuesday, March 18, 2003 9:07 AM
How is it possible to
eavesdrop on the Internet?
If someone is paranoid, that doesn't mean no one is stalking him.
Key experience no. 3
Diana, Princess of Wales who died in 199