Hugo Krawczyk is an IBM Fellow and a Distinguished Research Staff Member with the Cryptography
Group at the IBM T.
Key areas covered "Cryptography
" include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography
, Blockchain, and Zero-knowledge Proofs.
The government's crusade to limit the DES key to 56-bits calls attention to the tug-of-war that exists in cryptography
between government and public interests.
These new cryptography
enhancements support, in software, a wide variety of both public- and secret-key cryptography
algorithms, including RSA, DES, AES and Elliptic Curve Cryptography
And from PCs it's a short step back to cryptology, since cheap computing makes it possible for everyone to do cryptography
more crack-proof than the most powerful encryption that governments could do half a century ago.
The widespread use of cryptography
would advance many of the larger interests of law enforcement and national security.
The NRC report is a very valuable contribution to this debate," says Bruce McConnell of the Office of Management and Budget and cochair of the interagency working group on cryptography
Where Applied Cryptography
is a reference, Practical Cryptography
reads like a narrative.
Only a decade ago, quantum cryptography
was considered a crazy theoretical notion based on peculiar effects of interest only to those concerned about the philosophical foundations of quantum mechanics.
As part of our focus on delivering high-quality tamper-resistant security cores to serve the needs of ASIC and FPGA customers, Athena is excited to become a part of the Cryptography
Research DPA countermeasure developer ecosystem," said Dr.
Fortunately, books such as Cryptography
Decrypted: A Pictorial Introduction to Digital Security provide a good, largely jargon-free introduction to an often arcane subject.
To foil eavesdroppers, banks and other businesses handling electronic transactions have turned to various forms of cryptography
to scramble and hide sensitive information.