Cryptology
-10%
portes grátis
Cryptology
Classical and Modern
Sigmon, Neil; Klima, Richard E.; Klima, Richard; Sigmon, Neil P.
Taylor & Francis Ltd
12/2018
496
Dura
Inglês
9781138047624
15 a 20 dias
872
Descrição não disponível.
1. Introduction to Cryptology
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Public Key Cipher;Plaintext Letters;Introduction to Cryptology;RSA Cipher;cryptographic algorithms;Substitution Ciphers;Enigma cipher machine;Ciphertext Letter;Navajo code;Encryption Exponent;mathematics in cryptology;Affine Cipher;Maplet-based examples;Cipher Alphabet;public-key cryptography;Decryption Exponent;U.S. cryptographic standards;Shift Cipher;classical ciphers;Enigma Rotors;Message Authentication;Ciphertext Pairs;cryptanalysis;Playfair Ciphers;cryptology textbook;Symmetric Key Ciphers;Ring Setting;Plaintext Block;RSA Signature Scheme;Key Matrix;RSA Encryption;Discrete Logarithm Problem;Federal Information Processing Standard;Enigma Machine;ADFGVX Ciphers;Hill Cipher;Ks Mod
1. Introduction to Cryptology
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
Public Key Cipher;Plaintext Letters;Introduction to Cryptology;RSA Cipher;cryptographic algorithms;Substitution Ciphers;Enigma cipher machine;Ciphertext Letter;Navajo code;Encryption Exponent;mathematics in cryptology;Affine Cipher;Maplet-based examples;Cipher Alphabet;public-key cryptography;Decryption Exponent;U.S. cryptographic standards;Shift Cipher;classical ciphers;Enigma Rotors;Message Authentication;Ciphertext Pairs;cryptanalysis;Playfair Ciphers;cryptology textbook;Symmetric Key Ciphers;Ring Setting;Plaintext Block;RSA Signature Scheme;Key Matrix;RSA Encryption;Discrete Logarithm Problem;Federal Information Processing Standard;Enigma Machine;ADFGVX Ciphers;Hill Cipher;Ks Mod