Professional Documents
Culture Documents
and Practice
Chapter 2 – Cryptographic Tools
First Edition
by William Stallings and Lawrie Brown
Lecture slides by Lawrie Brown
Learning Objectives
After studying this chapter, you should be able to:
◆ Explain the basic operation of symmetric block encryption algorithms.
◆ Compare and contrast block encryption and stream encryption.
◆ Discuss the use of secure hash functions for message authentication.
◆ List other applications of secure hash functions.
◆ Explain the basic operation of asymmetric block encryption
algorithms.
◆ Present an overview of the digital signature mechanism and explain
the concept of digital envelopes.
◆ Explain the significance of random and pseudorandom numbers in
cryptography.
Cryptographic Tools