Cargando…

Cryptology : Classical and Modern /

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers. It also includes coverage of the Enigma machine, T...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Klima, Richard (Autor), Klima, Richard E. (Autor), Sigmon, Neil (Autor), Sigmon, Neil P. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : Chapman and Hall/CRC, 2018.
Edición:Second edition.
Colección:Chapman & Hall/CRC cryptography and network security.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • 1. Introduction to Cryptology
  • Basic Terminology
  • Cryptology in Practive
  • Why Study Cryptology?
  • 2. Substitution Ciphers
  • Keyword Substitution Ciphers
  • Cryptanalysis of Substitution Cipher
  • Playrair Ciphers
  • The Navajo Code
  • 3. Transposition Ciphers
  • Columnar Transposition Ciphers
  • Cryptanalysis of Transposition Ciphers
  • ADFGX and ADFGVX Ciphers
  • 4. The Enigma Machine
  • The Enigma Cipher Machine
  • Combinatorics
  • Security of the Enigma Machine
  • 5. The Turing Bombe
  • Cribs and Menus
  • Loops and Logical Inconsistencies
  • Searching for the Correct Configuration
  • The Diagonal Board
  • The Checking Machine
  • Turnovers
  • Clonking
  • Final Observations
  • 6. Shift and Affine Ciphers
  • Modular Arithmetic
  • Shift Ciphers
  • Cryptanalysis of Shift Ciphers
  • Affine Ciphers
  • Cryptanalysis of Affine Ciphers
  • 7. Alberti and Vigenere Ciphers
  • Alberti Ciphers
  • Vigenere Ciphers
  • Probability
  • The Friedman Test
  • The Kasiski Test
  • Cryptanalyis of Vigenere Keyword Ciphers
  • 8. Hill Ciphers
  • Matrices
  • Hill Ciphers
  • Cryptanalyis of Hill Ciphers
  • 9. RSA Ciphers
  • Introduction to Public-Key Ciphers
  • Introduction to RSA Ciphers
  • The Euclidean Algorithm
  • Modular Exponentiation
  • ASCII
  • RSA Ciphers
  • Cryptanalyis of RSA Ciphers
  • Primality Testing
  • Integer Factorization
  • The RSA Factoring Challenges
  • 10. ElGamal Ciphers
  • The Diffie-Hellman Key Exchange
  • Discrete Logarithms
  • ElGamal Ciphers
  • Cryptanalyis of ElGamal Ciphers
  • 11. The Advanced Encryption Standard
  • Representations of Numbers
  • Sream Ciphers
  • AES Preliminaries
  • AES Encryption
  • AES Decryption
  • AES Security
  • 12. Message Authentication
  • RSA Signatures
  • Hash Functions
  • RSA Signatures with Hashing
  • The Man-in-the-Middle Attack
  • Public-Key Infrastructures
  • Bibliography
  • Hints and Answers for Selected Exercises
  • Index.