Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon
Cryptology (eBook, PDF)
Classical and Modern
45,95 €
45,95 €
inkl. MwSt.
Sofort per Download lieferbar
45,95 €
Als Download kaufen
45,95 €
inkl. MwSt.
Sofort per Download lieferbar
Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon
Cryptology (eBook, PDF)
Classical and Modern
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.
- Geräte: PC
- mit Kopierschutz
- eBook Hilfe
- Größe: 9.11MB
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 496
- Erscheinungstermin: 7. Dezember 2018
- Englisch
- ISBN-13: 9781351692540
- Artikelnr.: 54787106
- Verlag: Taylor & Francis
- Seitenzahl: 496
- Erscheinungstermin: 7. Dezember 2018
- Englisch
- ISBN-13: 9781351692540
- Artikelnr.: 54787106
Richard E. Klima is a professor in the Department of Mathematical Sciences at Appalachian State University. Prior to Appalachian State, Dr. Klima was a cryptologic mathematician at the National Security Agency. He earned a Ph.D. in applied mathematics from North Carolina State University. His research interests include cryptology, error-correcting codes, applications of linear and abstract algebra, and election theory. Neil P. Sigmon is a professor in the Department of Mathematics and Statistics at Radford University. Dr. Sigmon earned a Ph.D. in applied mathematics from North Carolina State University. His research interests include cryptology, the use of technology to illustrate mathematical concepts, and applications of linear and abstract algebra.
1. Introduction to Cryptology
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
1. Introduction to Cryptology
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index
Basic Terminology
Cryptology in Practive
Why Study Cryptology?
2. Substitution Ciphers
Keyword Substitution Ciphers
Cryptanalysis of Substitution Cipher
Playrair Ciphers
The Navajo Code
3. Transposition Ciphers
Columnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers
4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma Machine
5. The Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the Correct Configuration
The Diagonal Board
The Checking Machine
Turnovers
Clonking
Final Observations
6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Cryptanalysis of Shift Ciphers
Affine Ciphers
Cryptanalysis of Affine Ciphers
7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
Cryptanalyis of Vigenere Keyword Ciphers
8. Hill Ciphers
Matrices
Hill Ciphers
Cryptanalyis of Hill Ciphers
9. RSA Ciphers
Introduction to Public-Key Ciphers
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
ASCII
RSA Ciphers
Cryptanalyis of RSA Ciphers
Primality Testing
Integer Factorization
The RSA Factoring Challenges
10. ElGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithms
ElGamal Ciphers
Cryptanalyis of ElGamal Ciphers
11. The Advanced Encryption Standard
Representations of Numbers
Sream Ciphers
AES Preliminaries
AES Encryption
AES Decryption
AES Security
12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The Man-in-the-Middle Attack
Public-Key Infrastructures
Bibliography
Hints and Answers for Selected Exercises
Index