Cryptology

Cryptology

Classical and Modern

Sigmon, Neil; Klima, Richard E.; Klima, Richard; Sigmon, Neil P.

Taylor & Francis Ltd

12/2018

496

Dura

Inglês

9781138047624

15 a 20 dias

872

Descrição não disponível.
1. Introduction to Cryptology

Basic Terminology

Cryptology in Practive

Why Study Cryptology?

2. Substitution Ciphers

Keyword Substitution Ciphers

Cryptanalysis of Substitution Cipher

Playrair Ciphers

The Navajo Code

3. Transposition Ciphers

Columnar Transposition Ciphers

Cryptanalysis of Transposition Ciphers

ADFGX and ADFGVX Ciphers

4. The Enigma Machine

The Enigma Cipher Machine

Combinatorics

Security of the Enigma Machine

5. The Turing Bombe

Cribs and Menus

Loops and Logical Inconsistencies

Searching for the Correct Configuration

The Diagonal Board

The Checking Machine

Turnovers

Clonking

Final Observations

6. Shift and Affine Ciphers

Modular Arithmetic

Shift Ciphers

Cryptanalysis of Shift Ciphers

Affine Ciphers

Cryptanalysis of Affine Ciphers

7. Alberti and Vigenere Ciphers

Alberti Ciphers

Vigenere Ciphers

Probability

The Friedman Test

The Kasiski Test

Cryptanalyis of Vigenere Keyword Ciphers

8. Hill Ciphers

Matrices

Hill Ciphers

Cryptanalyis of Hill Ciphers

9. RSA Ciphers

Introduction to Public-Key Ciphers

Introduction to RSA Ciphers

The Euclidean Algorithm

Modular Exponentiation

ASCII

RSA Ciphers

Cryptanalyis of RSA Ciphers

Primality Testing

Integer Factorization

The RSA Factoring Challenges

10. ElGamal Ciphers

The Diffie-Hellman Key Exchange

Discrete Logarithms

ElGamal Ciphers

Cryptanalyis of ElGamal Ciphers

11. The Advanced Encryption Standard

Representations of Numbers

Sream Ciphers

AES Preliminaries

AES Encryption

AES Decryption

AES Security

12. Message Authentication

RSA Signatures

Hash Functions

RSA Signatures with Hashing

The Man-in-the-Middle Attack

Public-Key Infrastructures

Bibliography

Hints and Answers for Selected Exercises

Index
Public Key Cipher;Plaintext Letters;Introduction to Cryptology;RSA Cipher;cryptographic algorithms;Substitution Ciphers;Enigma cipher machine;Ciphertext Letter;Navajo code;Encryption Exponent;mathematics in cryptology;Affine Cipher;Maplet-based examples;Cipher Alphabet;public-key cryptography;Decryption Exponent;U.S. cryptographic standards;Shift Cipher;classical ciphers;Enigma Rotors;Message Authentication;Ciphertext Pairs;cryptanalysis;Playfair Ciphers;cryptology textbook;Symmetric Key Ciphers;Ring Setting;Plaintext Block;RSA Signature Scheme;Key Matrix;RSA Encryption;Discrete Logarithm Problem;Federal Information Processing Standard;Enigma Machine;ADFGVX Ciphers;Hill Cipher;Ks Mod