Fr. 210.00

Understanding and Applying Cryptography and Data Security

English · Hardback

Shipping usually within 1 to 3 weeks (not available at short notice)

Description

Read more

Zusatztext This book is a good technical reference for someone who wishes to implement (or install) a security system based on existing techniques ? a good complementary book for a technical course to students who already know about the theory of cryptography but need to learn the technical details in order to implement existing protocols in new hardware.-Jeremy Barbay! University of Chile! in SIGACT NEWS! December 2011 Informationen zum Autor Elbirt\! Adam J. Klappentext A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues! it emphasizes cryptographic algorithm and protocol implementation in hardware! software! and embedded systems. Zusammenfassung A how-to guide for implementing algorithms and protocols. Addressing real-world implementation issues, it emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Inhaltsverzeichnis Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advanced Encryption StandardPublic-Key Cryptography Issues with Symmetric-Key Cryptosystems Public-Key Cryptosystem Overview One-Way Functions The Euclidean AlgorithmThe Extended Euclidean Algorithm Euler's Phi FunctionEuler's Theorem Fermat's Little Theorem Homework ProblemsPublic-Key Cryptography: RSACryptosystem Efficient ImplementationAttacks Homework ProblemsPublic-Key Cryptography: Discrete Logarithms Cyclic Groups The Discrete Logarithm Problem Diffie-Hellman Key Agreement Protocol Efficient Implementation ElGamal Encryption AttacksHomework ProblemsPublic-Key Cryptography: Elliptic Curves Cryptosystem Diffie-Hellman Key Agreement Protocol Efficient Implementation Menezes-Vanstone Encryption Attacks Homework ProblemsCryptographic Components Digital SignaturesHash FunctionsMessage Authentication CodesCryptographic Protocols Security Services Key EstablishmentApplicationsHomework ProblemsReferencesIndex ...

Customer reviews

No reviews have been written for this item yet. Write the first review and be helpful to other users when they decide on a purchase.

Write a review

Thumbs up or thumbs down? Write your own review.

For messages to CeDe.ch please use the contact form.

The input fields marked * are obligatory

By submitting this form you agree to our data privacy statement.