An Introduction to Cryptography
На английском.
Table of Contents:
Preface
Who should read this guide
How to use this guide
For more information
Customer service
Technical support
Related reading
Chapter 1. The Basics of Cryptography
Encryption and decryption
What is cryptography?
Strong cryptography
How does cryptography work?
Conventional cryptography
Caesar’s Cipher
Key management and conventional encryption
Public key cryptography
How PGP works
Keys
Digital signatures
Hash functions
Digital certificates
Validity and trust
Checking validity
Establishing trust
Meta and trusted introducers
Trust models
Direct Trust
Hierarchical Trust
Web of Trust
Levels of trust in PGP
Table of Contents
What is a passphrase?
Key splitting
Technical details
Chapter 2. Phil Zimmermann on PGP
Why I wrote PGP
The PGP symmetric algorithms
About PGP data compression routines
About the random numbers used as session keys
About the message digest
How to protect public keys from tampering
How does PGP keep track of which keys are valid?
How to protect private keys from disclosure
What if you lose your private key?
Beware of snake oil
Vulnerabilities
Compromised passphrase and private key
Public key tampering
Not Quite Deleted Files
Viruses and Trojan horses
Swap files or virtual memory
Physical security breach
Tempest attacks
Protecting against bogus timestamps
Exposure on multi-user systems
Traffic analysis
Cryptanalysis
Glossary