Fr. 219.00

Computer Security and Cryptography

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Zusatztext "...essential reading for professionals in e-commerce and information technology...it is also ideal for students." (IEEE Computer Magazine! March 2007) Informationen zum Autor ALAN G. KONHEIM , PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models. Klappentext Gain the skills and knowledge needed to create effective data security systemsThis book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.Three basic types of chapters are featured to facilitate learning:* Chapters that develop technical skills* Chapters that describe a cryptosystem and present a method of analysis* Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutionsWith consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students. Zusammenfassung Gain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. Inhaltsverzeichnis FOREWORD. PREFACE. ABOUT THE AUTHOR. CHAPTER 1: APERITIFS. 1.1 The Lexicon of Cryptography. 1.2 Cryptographic Systems. 1.3 Cryptanalysis. 1.4 Side Information. 1.5 Thomas Jefferson and the M-94. 1.6 Cryptography and History. 1.7 Cryptography and Computers. 1.8 The National Security Agency. 1.9 The Giants. 1.10 No Sex, Money, Crime or . . . Love. 1.11 An Example of the Inference Process in Cryptanalysis. 1.12 Warning! CHAPTER 2: COLUMNAR TRANSPOSITION. 2.1 Shannon's Classification of Secrecy Transformations. 2.2 The Rules of Columnar Transposition Encipherment. 2.3 Cribbing. 2.4 Examples of Cribbing. 2.5 Plaintext Language Models. 2.6 Counting k-Grams. 2.7 Deriving the Parameters of a Markov Model from Sliding Window Counts. 2.8 Markov Scoring. 2.9 The ADFGVX Transposition System. 2.10 CODA. 2.11 Columnar Transposition Problems. CHAPTER 3: MONOALPHABETIC SUBSTITUTION. 3.1 Monoalphabetic Substitution. 3.2 Caesar's Cipher. 3.3 Cribbing Using Isomorphs. 3.4 The x2-Test of a Hypothesis. 3.5 Pruning from the Table of Isomorphs. 3.6 Partial Maximum Likelihood ...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.