| |
Following this tutorial look for two related cryptology tutorials.
In this part, we have addressed the basic concepts of cryptology;
tutorial users should now understand the meaning of concepts like symmetric
and asymetric algorithms, key-length, cryptanalysis, and
algorithms/protocols. Part 2 will address symmetric and
asymmetric (public-key) algorithms in terms of the basic mathematical
principles of their construction. Part 3 will move on to
describe a number of actual protocols, many of which use the
algorithms described in part 2 as their building blocks. After
completing all three tutorials, users should have an excellent
foundation for constructing working cryptosystems
that are tailored to their specific requirements.
|