5.1 | Introduction |
5.2 | Secure Transmission of Messages |
5.3 | Key Exchange |
5.4 | Digital Signatures |
5.5 | Entity Authentication |
Chapter Summary | |
Sugestions for Further Reading |
An essential element of freedom is the right to privacy, a right that cannot be expected to stand against an unremitting technological attack.
—Whitfield Diffie
Mary had a little key (It’s all she could export), and all the email that she sent was opened at the Fort.
—Ronald L. Rivest
Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.
—Clifford Stoll
18.191.195.183