Riassunto:
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.
With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies, as well as applications, including login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography.
New to the Second Edition:
An introductory chapter that provides more information on mathematical facts and complexity theory
Expanded and updated exercises sets, including some routine exercises
More information on primality testing and cryptanalysis
Accessible and logically organized, An Introduction to Cryptography, Second Edition is the essential book on the fundamentals of cryptography.
Contenuti:
Preface
MATHEMATICAL BASICS
Divisibility
Primes, Primality Testing, and Induction
An Introduction to Congruences
Euler, Fermat, and Wilson
Primitive Roots
The Index Calculus and Power Residues
Legendre, Jacobi, & Quadratic Reciprocity
Complexity
CRYPTOGRAPHIC BASICS
Definitions and Illustrations
Classic Ciphers
Stream Ciphers
LFSRs
Modes of Operation
Attacks
DES AND AES
S-DES and DES
AES
PUBLIC-KEY CRYPTOGRAPHY
The Ideas behind PKC
Digital Envelopes and PKCs
RSA
ElGamal
DSA - The DSS
PRIMALITY TESTING
True Primality Tests
Probabilistic Primality Tests
Recognizing Primes
FACTORING
Classical Factorization Methods
The Continued Fraction Algorithm
Pollard's Algorithms
The Quadratic Sieve
The Elliptic Curve Method (ECM)
ELECTRONIC MAIL AND INTERNET SECURITY
History of the Internet and the WWW
Pretty Good Privacy (PGP)
Protocol Layers and SSL
Internetworking and Security - Firewalls
Client-Server Model and Cookies
LEADING-EDGE APPLICATIONS
Login and Network Security
Viruses and Other Infections
Smart Cards
Biometrics
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.