Learn the history, operation, applications (and flaws) of 10 key algorithms that have shaped cryptographic data protection.
Algorithms are critical to online cryptographic data protection, and this book gives you a tour of the 10 most significant among them-covering their operation, applications, and flaws. Through real-world examples using each algorithm, you'll get a big-picture view of why cryptography matters and how it can help keep our everyday networked environments safe.
Rather than focusing on mathematical and computational theory, the author-an award-winning scholar-demonstrates how to select the right solution for real-world security problems. Each chapter gives an in-depth understanding of a different algorithm, discussing its history, operation, and applications for data protection. You'll learn how these algorithms operate in practice, without sacrificing mathematical rigor. You'll also learn how the algorithms were improved over time, giving you an in-depth understanding of the history of their development and how to work with their existing flaws.