Chapter V. CRYPTOGRAPHIC PROTECTION OF
INFORMATION
5.1. Encryption methods............................................................
70
5.2. Symmetric encryption.......................................................
83
5.3. Asymmetric encryption......................................................
99
5.4. Hash function.......................................................................
106
5.5. Digital signature..................................................................
114
5.6. Steganography.....................................................................
124
5.7. Cryptanalysis methods......................................................
128
Chapter VI. IDENTIFICATION AND
AUTHENTICATION
6
.1. Concept o f identification and authentication....................
131
6.2. Password-based authentication........................................... 137
6.3. Certificate-based authentication.......................................
142
6.4. Strict authentication..........................................................
145
6.5. Biometric identification and authentication o f users.......
164