Cryptographic Controls: The Heart of Cybersecurity

Cryptography lies at the heart of all cybersecurity technologies, and appreciating the role it plays is vital to understanding how to secure cyberspace. In this chapter, we review the basic tools provided by cryptography and how they are used to provide the core security services of confidentiality, data integrity, and entity authentication in cyberspace.
This is a preview of subscription content, log in via an institution to check access.
Access this chapter
Subscribe and save
Springer+ Basic
€32.70 /Month
- Get 10 units per month
- Download Article/Chapter or eBook
- 1 Unit = 1 Article or 1 Chapter
- Cancel anytime
Buy Now
Price includes VAT (France)
eBook EUR 534.99 Price includes VAT (France)
Hardcover Book EUR 527.49 Price includes VAT (France)
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others

Cryptographic Controls: The Heart of Cybersecurity
Chapter © 2018

Standardization of Cryptographic Techniques – The Influence of the Security Agencies
Chapter © 2015

The Future of Information Security Research: Cryptology and Beyond
Chapter © 2014
References
- Ferguson N, Schneier B, Kohno T (2010) Cryptography engineering. Wiley, Indianapolis Google Scholar
- Martin KM (2017) Everyday cryptography, 2nd edn. Oxford University Press, Oxford BookGoogle Scholar
- Paar C, Pelzl J (2011) Understanding cryptography. Springer, Heidelberg Dordrecht London New York Google Scholar
- Piper F, Murphy S (2002) Cryptography: a very short introduction. Oxford University Press, Oxford BookGoogle Scholar
Author information
- Information Security Group, Royal Holloway, University of London, Egham, Surrey, UK Keith M. Martin
- Keith M. Martin