Fr. 186.00
Bruen, Aiden Bruen, Aiden A Bruen, Aiden A. Bruen, Aiden A. (Carleton University Bruen, Aiden A. Forcinito Bruen...
Cryptography, Information Theory, and Error-Correction - A Handbook for the 21st Century
Englisch · Fester Einband
Versand in der Regel in 1 bis 3 Wochen (kurzfristig nicht lieferbar)
Beschreibung
CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field
As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book.
This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book's discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs.
Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage. Increased security and applicable research in elliptic curve cryptography are also featured. The book also:
* Shares vital, new research in the field of information theory
* Provides quantum cryptography updates
* Includes over 350 worked examples and problems for greater understanding of ideas.
Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.
Inhaltsverzeichnis
Preface to the Second Edition xvii
Acknowledgments for the Second Edition xxiii
Book Website xxv
About the Authors xxvii
I Mainly Cryptography 1
1 Historical Introduction and the Life and Work of Claude E. Shannon 3
1.1 Historical Background 3
1.2 Brief Biography of Claude E. Shannon 9
1.3 Career 10
1.4 Personal - Professional 10
1.5 Scientific Legacy 11
1.6 The Data Encryption Standard Code, DES, 1977-2005 14
1.7 Post-Shannon Developments 15
2 Classical Ciphers and Their Cryptanalysis 21
2.1 Introduction 22
2.2 The Caesar Cipher 22
2.3 The Scytale Cipher 24
2.4 The Vigen`ere Cipher 25
2.5 Frequency Analysis 26
2.6 Breaking the Vigen`ere Cipher, Babbage-Kasiski 27
2.7 The Enigma Machine and Its Mathematics 33
2.8 Modern Enciphering Systems 37
2.9 Problems 37
2.10 Solutions 39
3 RSA, Key Searches, TLS, and Encrypting Email 47
3.1 The Basic Idea of Cryptography 49
3.2 Public Key Cryptography and RSA on a Calculator 53
3.3 The General RSA Algorithm 56
3.4 Public Key Versus Symmetric Key 60
3.5 Attacks, Security, Catch-22 of Cryptography 62
3.6 Summary of Encryption 65
3.7 The Diffie-Hellman Key Exchange 66
3.8 Intruder-in-the-Middle Attack on the Diffie-Hellman (or Elliptic Curve) Key-Exchange 69
3.9 TLS (Transport Layer Security) 70
3.10 PGP and GPG 72
3.11 Problems 73
3.12 Solutions 76
4 The Fundamentals of Modern Cryptography 83
4.1 Encryption Revisited 83
4.2 Block Ciphers, Shannon's Confusion and Diffusion 86
4.3 Perfect Secrecy, Stream Ciphers, One-Time Pad 87
4.4 Hash Functions 91
4.5 Message Integrity Using Symmetric Cryptography 93
4.6 General Public Key Cryptosystems 94
4.7 Digital Signatures 97
4.8 Modifying Encrypted Data and Homomorphic Encryption 99
4.9 Quantum Encryption Using Polarized Photons 99
4.10 Quantum Encryption Using Entanglement 102
4.11 Quantum Key Distribution is Not a Silver Bullet 103
4.12 Postquantum Cryptography 104
4.13 Key Management and Kerberos 104
4.14 Problems 106
4.15 Solutions 107
5 Modes of Operation for AES and Symmetric Algorithms 109
5.1 Modes of Operation 109
5.2 The Advanced Encryption Standard Code 111
5.3 Overview of AES 114
6 Elliptic Curve Cryptography (ECC) 125
6.1 Abelian Integrals, Fields, Groups 126
6.2 Curves, Cryptography 128
6.3 The Hasse Theorem, and an Example 129
6.4 More Examples 131
6.5 The Group Law on Elliptic Curves 131
6.6 Key Exchange with Elliptic Curves 134
6.7 Elliptic Curves mod n 134
6.8 Encoding Plain Text 135
6.9 Security of ECC 135
6.10 More Geometry of Cubic Curves 135
6.11 Cubic Curves and Arcs 136
6.12 Homogeneous Coordinates 137
6.13 Fermat's Last Theorem, Elliptic Curves, Gerhard Frey 137
6.14 A Modification of the Standard Version of Elliptic Curve Cryptography 138
6.15 Problems 139
6.16 Solutions 140
7 General and Mathematical Attacks in Cryptography 143
7.1 Cryptanalysis 143
7.2 Soft Attacks 144
7.3 Brute-Force Attacks 145
7.4 Man-in-the-Middle Attacks 146
7.5 Relay Attacks, Car Key Fobs 148
7.6 Known Plain Text Attacks 150
&
Über den Autor / die Autorin
Aiden A. Bruen, PhD, was most-recently adjunct research professor in the School of Mathematics and Statistics at Carleton University. He was professor of mathematics and honorary professor of applied mathematics at the University of Western Ontario from 1972-1999 and has instructed at various institutions since then. Dr. Bruen is the co-author of Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century (Wiley, 2004).
Mario A. Forcinito, PhD, is Director and Chief Engineer at AP Dynamics Inc. in Calgary. He is previously instructor at the Pipeline Engineering Center at the Schulich School of Engineering in Calgary. Dr. Forcinito is co-author of Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century (Wiley, 2004).
Zusammenfassung
CRYPTOGRAPHY, INFORMATION THEORY, AND ERROR-CORRECTION
A rich examination of the technologies supporting secure digital information transfers from respected leaders in the field
As technology continues to evolve Cryptography, Information Theory, and Error-Correction: A Handbook for the 21ST Century is an indispensable resource for anyone interested in the secure exchange of financial information. Identity theft, cybercrime, and other security issues have taken center stage as information becomes easier to access. Three disciplines offer solutions to these digital challenges: cryptography, information theory, and error-correction, all of which are addressed in this book.
This book is geared toward a broad audience. It is an excellent reference for both graduate and undergraduate students of mathematics, computer science, cybersecurity, and engineering. It is also an authoritative overview for professionals working at financial institutions, law firms, and governments who need up-to-date information to make critical decisions. The book's discussions will be of interest to those involved in blockchains as well as those working in companies developing and applying security for new products, like self-driving cars. With its reader-friendly style and interdisciplinary emphasis this book serves as both an ideal teaching text and a tool for self-learning for IT professionals, statisticians, mathematicians, computer scientists, electrical engineers, and entrepreneurs.
Six new chapters cover current topics like Internet of Things security, new identities in information theory, blockchains, cryptocurrency, compression, cloud computing and storage. Increased security and applicable research in elliptic curve cryptography are also featured. The book also:
* Shares vital, new research in the field of information theory
* Provides quantum cryptography updates
* Includes over 350 worked examples and problems for greater understanding of ideas.
Cryptography, Information Theory, and Error-Correction guides readers in their understanding of reliable tools that can be used to store or transmit digital information safely.
Produktdetails
Autoren | Bruen, Aiden Bruen, Aiden A Bruen, Aiden A. Bruen, Aiden A. (Carleton University Bruen, Aiden A. Forcinito Bruen, Bruen Aiden A., Mario Forcinito, Mario A Forcinito, Mario A. Forcinito, Forcinito Mario A., Jam M McQuillan, James M. McQuillan, James McQuillan, James M. McQuillan |
Verlag | Wiley, John and Sons Ltd |
Sprache | Englisch |
Produktform | Fester Einband |
Erschienen | 25.05.2021 |
EAN | 9781119582427 |
ISBN | 978-1-119-58242-7 |
Seiten | 688 |
Themen |
Naturwissenschaften, Medizin, Informatik, Technik
> Mathematik
> Sonstiges
Computersicherheit, Mathematik, Informatik, Kryptographie, informationstechnologie, Mathematics, computer science, cryptography, Information Technologies, Computer Security & Cryptography, Computersicherheit u. Kryptographie |
Kundenrezensionen
Zu diesem Artikel wurden noch keine Rezensionen verfasst. Schreibe die erste Bewertung und sei anderen Benutzern bei der Kaufentscheidung behilflich.
Schreibe eine Rezension
Top oder Flop? Schreibe deine eigene Rezension.