Cover image for Cryptography demystified
Title:
Cryptography demystified
Personal Author:
Publication Information:
New York : McGraw-Hill, 2003
ISBN:
9780071406383

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010023357 QA76.9.A25 H47 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.









AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY

Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. "Crypto" is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics--but dread the thick tomes that are your only other option--help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that's actually fun to use.

You must read this book if--
* You prefer your simplifications from an expert who understands the complexities
* 6 years of success as a short course for students and professionals works for you
* you enjoy hearing the phrase "nothing to memorize"
* ecommerce, email, network security, or wireless communications is part of your bailiwick
* cracking cryptography means a jump up the career ladder
* the words "public-key cryptography," "channel-based cryptography," and "prime numbers" pique your interest
* best-practices cryptography is the only secure way for you--and your company--to go

One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial--the first to make the basics of the science truly accessible.


Author Notes

John E. Hershey has more than 30 years' experience in telecom security. The author or co-author of five advanced texts: Hadamard Matrix Analysis and Synthesis : With Applications to Communications and Signal/Image Processing; The Elements of System Design; Data Transportation and Protection (Applications of Communications Theory); Perspectives in Spread Spectrum; and Doppler Applications in LEO Satellite Communication Systems , he was elected a Fellow of the IEEE "for contributions to secure communications" and currently teaches cryptography at Rensselaer Polytechnic Institute in Troy, New York. He lives in Ballston Lake, New York.


Table of Contents

Part I Introduction to Symmetric Cryptographyp. 1
Module 1 First Considerationsp. 3
Exercise 1p. 8
Module 2 Plaintextp. 11
Exercise 2p. 17
Module 3 Digitization of Plaintextp. 21
Exercise 3p. 29
Module 4 Toward a Cryptographic Paradigmp. 31
Exercise 4p. 36
Module 5 What We Want from the Keytextp. 37
Exercise 5p. 45
Module 6 Randomness Ip. 49
Exercise 6p. 57
Module 7 Finite State Sequential Machinesp. 59
Exercise 7p. 63
Transition Matrixp. 63
Module 8 m-sequencesp. 67
Exercise 8p. 72
Module 9 The Paradigm Attemptedp. 75
Exercise 9p. 81
Module 10 The Block Cipher Function - A Modern Keystone to the Paradigmp. 83
Exercise 10p. 87
Module 11 Confidentiality Modes: ECB and CTRp. 89
Exercise 11p. 95
Module 12 Confidentiality Mode: Output Feedback (OFB)p. 97
Exercise 12p. 100
Module 13 Confidentiality Modes: Cipher Feedback (CFB) and Cipher Block Chaining (CBC)p. 101
Exercise 13p. 107
Part II Number Theory We Will Needp. 109
Module 14 Prime Numbers Ip. 111
Exercise 14p. 117
Module 15 Congruencesp. 119
Exercise 15p. 124
Module 16 Euler-Fermat Theoremp. 125
Exercise 16p. 130
Module 17 The Euler Phi ([phi]) Functionp. 131
Exercise 17p. 134
Module 18 The Binary Exponentiation Algorithmp. 135
Exercise 18p. 138
Module 19 The Extended Euclidean Algorithmp. 139
Exercise 19p. 143
Module 20 Primitive Rootsp. 145
Exercise 20p. 149
Module 21 Chinese Remainder Theoremp. 151
Exercise 21p. 153
Part III Introduction to Public Key Cryptographyp. 155
Module 22 Merkle's Puzzlep. 157
Exercise 22p. 160
Module 23 The Diffie-Hellman Public Key Cryptographic Systemp. 161
Exercise 23p. 166
Module 24 Split Searchp. 167
Exercise 24p. 171
Module 25 A Variant of the Diffie-Hellman Systemp. 173
Exercise 25p. 181
Module 26 The RSA Public Key Cryptographic Systemp. 183
Exercise 26p. 192
Module 27 Prime Numbers IIp. 193
Exercise 27p. 197
Part IV Keying Variablesp. 199
Module 28 Keying Variable Distributionp. 201
Exercise 28p. 206
Module 29 Secret Sharingp. 207
Exercise 29p. 214
Module 30 Randomness IIp. 215
Exercise 30p. 223
Module 31 Cryptovariablesp. 225
Exercise 31p. 229
Part V Crypto-Obsolescencep. 233
Module 32 The Aging Cryptoalgorithmp. 235
Exercise 32p. 245
Module 33 Superdesp. 247
Exercise 33p. 257
Part VI Channel-Based Cryptographyp. 259
Module 34 The Channel Is the Cryptovariablep. 261
Exercise 34p. 267
Module 35 The Quantum Cryptographic Channelp. 269
Exercise 35p. 281
Answers to Exercisesp. 283
Glossaryp. 343
Indexp. 349