Chapter V. CRYPTOGRAPHIC PROTECTION OF
INFORMATION
5.1. Encryption methods..........................................................
70
5.2. Symmetric encryption.....................................................
83
5.3. Asymmetric encryption....................................................
99
5.4. Hash function.....................................................................
106
5.5. Digital signature...............................................................
114
5.6. Steganography...................................................................
124
5.7. Cryptanalysis methods....................................................
128