Cryptography, Information Theory, and Error-Correction : A Handbook for the 21st Century


Aiden A. Bruen
Bok Engelsk 2011 · Electronic books.
Annen tittel
Utgitt
Hoboken : : Wiley, , 2011.
Omfang
1 online resource (496 p.)
Opplysninger
Description based upon print version of record.. - Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century; Contents; Preface; I Cryptography; 1 History and Claude E. Shannon; 1.1 Historical Background; 1.2 Brief Biography of Claude E. Shannon; 1.3 Career; 1.4 Personal-Professional; 1.5 Scientific Legacy; 1.6 Modern Developments; 2 Classical Ciphers and Their Cryptanalysis; 2.1 Introduction; 2.2 The Caesar Cipher; 2.3 The Scytale Cipher; 2.4 The Vigenère Cipher; 2.5 The Enigma Machine and Its Mathematics; 2.6 Frequency Analysis; 2.7 Breaking the Vigenère Cipher, Babbage-Kasiski; 2.8 Modern Enciphering Systems. - 2.9 Problems2.10 Solutions; 3 RSA, Key Searches, SSL, and Encrypting Email; 3.1 Background; 3.2 The Basic Idea of Cryptography; 3.3 Public Key Cryptography and RSA on a Calculator; 3.4 The General RSA Algorithm; 3.5 Public Key Versus Symmetric Key; 3.6 Attacks, Security of DES, Key-spaces; 3.7 Summary of Encryption; 3.8 SSL (Secure Socket Layer); 3.9 PGP and GPG; 3.10 RSA Challenge; 3.11 Problems; 3.12 Solutions; 4 The Fundamentals of Modern Cryptography; 4.1 Encryption Revisited; 4.2 Block Ciphers, Shannon's Confusion and Diffusion; 4.3 Perfect Secrecy, Stream Ciphers, One-Time Pad. - 4.4 Hash Functions4.5 Message Integrity Using Symmetric Cryptography; 4.6 General Public Key Cryptosystems; 4.7 Electronic Signatures; 4.8 The Diffie-Hellman Key Exchange; 4.9 Quantum Encryption; 4.10 Key Management and Kerberos; 4.11 DES; 4.12 Problems; 4.13 Solutions; 5 DES, AES and Operating Modes; 5.1 The Data Encryption Standard Code; 5.2 Triple DES; 5.3 DES and Unix; 5.4 The Advanced Encryption Standard Code; 5.5 Problems; 5.6 Solutions; 6 Elliptic Curve Cryptography (ECC); 6.1 Abelian Integrals, Fields, Groups; 6.2 Curves, Cryptography; 6.3 Nonsingularity. - 6.4 The Hasse Theorem, and an Example6.5 More Examples; 6.6 The Group Law on Elliptic Curves; 6.7 Key Exchange with Elliptic Curves; 6.8 Elliptic Curves mod n; 6.9 Encoding Plain Text; 6.10 Security of ECC; 6.11 More Geometry of Cubic Curves; 6.12 Cubic Curves and Arcs; 6.13 Homogeneous Coordinates; 6.14 Fermat's Last Theorem, Elliptic Curves, Gerhard Frey; 6.15 Problems; 6.16 Solutions; 7 Attacks in Cryptography; 7.1 Cryptanalysis; 7.2 Soft Attacks; 7.3 Brute Force Attacks; 7.4 Man-In-The-Middle Attacks; 7.5 Known Plain Text Attacks; 7.6 Known Cipher Text Attacks. - 7.7 Chosen Plain Text Attacks7.8 Chosen Cipher Text Attacks, Digital Signatures; 7.9 Replay Attacks; 7.10 Birthday Attacks; 7.11 Birthday Attack on Digital Signatures; 7.12 Birthday Attack on the Discrete Log Problem; 7.13 Attacks on RSA; 7.14 Attacks on RSA using Low-Exponents; 7.15 Timing Attack; 7.16 Differential Cryptanalysis; 7.17 Implementation Errors and Unforeseen States; 8 Practical Issus; 8.1 Introduction; 8.2 Hot Issues; 8.3 Authentication; 8.4 E-Commerce; 8.5 E-Government; 8.6 Key Lengths; 8.7 Digital Rights; 8.8 Wireless Networks; 8.9 Communication Protocols. - II Information Theory. - Discover the first unified treatment of today's most essential information technologies- Compressing, Encrypting, and Encoding With identity theft, cybercrime, and digital file sharing proliferating in today's wired world, providing safe and accurate information transfers has become a paramount concern. The issues and problems raised in this endeavor are encompassed within three disciplines: cryptography, information theory, and error-correction. As technology continues to develop, these fields have converged at a practical level, increasing the need for a unified treatment of these three co
Emner
Sjanger
Dewey
ISBN
0471653179

Bibliotek som har denne