In this chapter we discuss fundamental issues and techniques for handling cryptographic keys. We also introduce the important concept of public-key cryptography. We examine the following topics:
■ Managing and using secret keys
■ Wrapping techniques for secret keys
■ Detecting errors and protecting file integrity
■ Public-key cryptography and, briefly, quantum cryptography
■ Public-key techniques for signing data and wrapping keys
■ Public-key certificates
18.116.90.141