This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.
Edición: Wiley (2007)
Idioma: Inglés
Formato: PDF
Contenido:
- Aperitifs
- Columnar Transposition
- Monoalphabetic Substitution
- Polyalphabetic Substitution
- Statistical Tests
- The Emergence of Cipher Machines
- The Japanese Cipher Machines
- Stream Ciphers
- Block-Ciphers: LUCIFER, DES, AND AES
- The Paradigm of Public KEY Cryptography
- The Knapsack Cryptosystem
- The RSA Cryptosystem
- Prime Numbers and Factorization
- The Discrete Logarithm Problem
- Elliptic Curve Cryptography
- Key Exchange in a Network
- Digital Signatures and Authentication
- Applications of Cryptography
- Cryptographic Patents
Descarga/Download
No hay comentarios:
Publicar un comentario