Cryptography Demystified

Cryptography Demystified

  • ただいまウェブストアではご注文を受け付けておりません。 ⇒古書を探す
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 304 p.
  • 言語 ENG
  • 商品コード 9780071406383
  • DDC分類 005.82

Full Description


Publisher's Noteguaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. "Crypto" is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics-but dread the thick tomes that are your only other option-help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that's actually fun to use.You must read this book if-* You prefer your simplifications from an expert who understands the complexities * 6 years of success as a short course for students and professionals works for you* you enjoy hearing the phrase "nothing to memorize" * ecommerce, email, network security, or wireless communications is part of your bailiwick* cracking cryptography means a jump up the career ladder* the words "public-key cryptography," "channel-based cryptography," and "prime numbers" pique your interest * best-practices cryptography is the only secure way for you-and your company-to goOne of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial-the first to make the basics of the science truly accessible.

Contents

Part IConsiderations Exercise 1 Module 2 Plaintext Exercise 2 Module 3 Digitization of Plaintext Exercise 3 Module 4 Toward a Cryptographic Paradigm Exercise 4 Module 5 What We Want from the Keytext Exercise 5 Module 6 Randomness I Exercise 6 Module 7 Finite State Sequential Machines Exercise 7 Transition Matrix Module 8 m-sequences Exercise 8 Module 9 The Paradigm Attempted Exercise 9 Module 10 The Block Cipher Function - A Modern Keystoneto the Paradigm Exercise 10 Module 11 Confidentiality Modes: ECB and CTR Exercise 11 Module 12 Confidentiality Mode: Output Feedback (OFB) Exercise 12 Module 13 Confidentiality Modes: Cipher Feedback (CFB)and Cipher Block Chaining (CBC) Exercise 14 Module 15 Congruences Exercise 15 Module 16 Euler-Fermat Theorem Exercise 16 Module 17 The Euler Phi (f) Function Exercise 17 Module 18 The Binary Exponentiation Algorithm Exercise 18 Module 19 The Extended Euclidean Algorithm Exercise 19 Module 20 Primitive Roots Exercise 20 Module 21 Chinese CRYPTOGRAPHY Module 22 Merkle's Puzzle Exercise 22 Module 23 The Diffie-Hellman Public Key Cryptographic System Exercise 23 Module 24 Split Search Exercise 24 Module 25 A Variant of the Diffie-Hellman System Exercise 25 Module 26 The RSA Public Key Cryptographic System Exercise 26 Module 27 Prime Numbers II Exercise 27 Part IV KEYING VARIABLES Module 28 Keying Variable Distribution Exercise 28 Module 29 Secret Sharing Exercise 29 Module 30 Randomness II Exercise 30 Module 31 Cryptovariables Exercise 31 Part V CRYPTO-OBSOLESCENCE Module 32 The Aging Cryptoalgorithm Exercise 32 Module 33 SUPERDES(tm) Exercise 33 Part VI CHANNEL-BASED CRYPTOGRAPHY Module 34 The Channel Is the Cryptovariable Exercise 34 Module 35 The Quantum Cryptographic Channel Exercise 35 Answers to Exercises Glossary IndexNER(01): WOW