Summary

  

This chapter provided the basis for understanding the symmetric ciphers. An implementation of an RSA algorithm was given to show some of its characteristics and the differences between asymmetric and symmetric algorithms. Cipher algorithms can be described in both mathematics and its constructs. The mathematics describes the algorithm by assigning operations and variables and executing them in a function so you understand the complexities and issues surrounding an algorithm in a common language.

The constructs, like the substitutions in an S-box, are used to understand the process and how a physical form of the algorithm would be processed . The characteristics of the cipher algorithms can be used to differentiate and classify the different cipher algorithms. The speed of an algorithm might mean that it is not complex. The complexity of the algorithm might mean that there are many dependencies within the algorithm. Understanding these properties and concepts provides an introduction to using the cipher algorithms for solving security problems.

  


Java Security Solutions
Java Security Solutions
ISBN: 0764549286
EAN: 2147483647
Year: 2001
Pages: 222

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net