Classical and Contemporary Cryptology / Edition 1

Hardcover (Print)
Buy Used
Buy Used from BN.com
$47.05
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $1.99
Usually ships in 1-2 business days
(Save 97%)
Other sellers (Hardcover)
  • All (11) from $1.99   
  • New (1) from $65.50   
  • Used (10) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$65.50
Seller since 2010

Feedback rating:

(13)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new, hardcover, isbn: 0131828312, receive the book in 2-5 days

Ships from: Rowland Heights, CA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
Page 1 of 1
Showing All
Close
Sort by

Overview


Some people work hard at encoding their secrets; other people work just as hard at deciphering them. Students of cryptology must learn to understand the thinking and techniques of both sides. As Dr. Spillman explores the world of cryptology, he spans introductory to advanced topics, presenting the history and methodology of spies, code breakers, code talkers, and present-day computer hackers and attackers. The cryptographic analysis software included with the book enables students to perform simple hands-on activities that teach them to think like a cryptographer as they learn to fend off attacks or secure software systems. Important features:
  • Coverage of both classical and contemporary cryptology allows students to learn current methods by understanding their origins in early work.
  • The included CAP software package allows students to test their skills while instructors can add interesting new challenges.
  • Stream cipher coverage lets students see how an important cipher is implemented in practice.
  • Use of block ciphers in a network introduces students to the actual use of a cipher system.
  • Charts ending each chapter illustrate how newly covered ciphers fit in and the interrelationships that exist between ciphers.
  • Optional chapter on quantum computing offers advanced study topics.
Read More Show Less

Product Details

  • ISBN-13: 9780131828315
  • Publisher: Pearson
  • Publication date: 5/26/2004
  • Edition description: BK&CD-ROM
  • Edition number: 1
  • Pages: 478
  • Product dimensions: 6.90 (w) x 9.30 (h) x 0.80 (d)

Meet the Author


Dr. Richard Spillman's interests range from computer security to artificial intelligence to digital hardware design. He has been teaching computer science and engineering courses for more than 20 years, first at the University of California at Davis and now at Pacific Lutheran University in Tacoma. While teaching, Dr. Spillman has also worked as a senior engineer at the Boeing Company and has consulted with several corporations and industry-related groups.
Read More Show Less

Table of Contents

Ch. 1 Introduction to cryptology 1
Pt. 1 Classical cryptology 15
Ch. 2 Classical monoalphabetic ciphers 16
Ch. 3 Classical polyalphabetic ciphers 36
Ch. 4 Classical polygraphic ciphers 67
Ch. 5 Classical transposition ciphers 85
Pt. 2 Contemporary ciphers 103
Ch. 6 Stream ciphers 104
Ch. 7 Block ciphers 132
Ch. 8 Public key ciphers 183
Ch. 9 Key management, digital signatures, hash functions, and certificates 221
Pt. 3 The future of cryptology 267
Ch. 10 Quantum cryptography 268
Read More Show Less

Preface


The goal of this book is to introduce you to the fascinating world of cryptography. It is a multifaceted world—for some, it is a world of spies and secrets. For others, it is a world of mathematics and computers. Anyway you look at it, cryptography has an air of mystery and adventure. It also transcends traditional academic disciplines. It is not just a computer-science topic—the study of cryptography involves history, political science, engineering, languages, military science, ethics, mathematics, and technology. No single text could cover cryptography from all these perspectives, so the true student of cryptography must be prepared to develop a broad educational background. This book will only serve as the starting point for a long and satisfying search for knowledge and understanding of this very complicated, yet rewarding, topic.
Two overall principles guided the writing of this book. The first is that cryptography did not begin with the invention of the computer. While contemporary ciphers are all computer based, they owe a lot to the early work of the developers of classical ciphers. These developers had to work by hand using paper and pencil to discover weaknesses in the classical ciphers. Without the aid of a computer or even a calculator, they had to train their minds to recognize patterns and to organize data. Hence, to learn how to "think" like a cryptographer, you need to understand and appreciate the cleverness and patience that underlie the classical systems.
The second guiding principle is that a course in cryptography is not (and should not be) a programming course. While it may be helpful for students to write one or two programs thatimplement a cipher or an analysis tool, the time it would take learning how to write and debug code for all the important ciphers and tools would significantly reduce the time available to learn the real substance of cryptology. The task of writing cipher programs should be part of an algorithms or programming course. Hence, this book comes with a software package, Cryptographic Analysis Program (CAP), that provides access to both classical and contemporary ciphers. It also contains a set of tools for the analysis of those ciphers. The combination of the text and the software will give you real hands-on experience.
Beginning students, hobbyists, and advanced students should find something worthwhile in this text and its accompanying software program, CAP Part One covers classical issues in cryptography and is a good place for those new to the field to begin their study. More advanced students may want to quickly scan this part for information on running CAP and perhaps spend more time on those classical ciphers or analysis techniques that are unfamiliar. Part Two covers contemporary ciphers including stream, block, and public key systems. This is the section that the more advanced students will find most useful. Part Three considers the future of cryptography and provides a short introduction to quantum systems. The world of quantum computing is so strange that it challenges our view of how the universe operates. This section is really for those who can abandon all common sense, be they beginning or advanced students.
There is a Web page for this book, which can be found at . (Follow the CAP pointers.) It contains a set of PowerPoint files which are designed for lectures. Instructors also have access to answers to the problems in the book as well as additional problems and test questions.
The single most unique feature of this text is the accompanying software package, CAP. Together, CAP and the text are designed to create a complete learning environment. As you read about a particular cipher system, CAP allows you to explore the operation of that system. As you study an analysis technique, CAP allows you to experiment with it. CAP implements 30 different ciphers following a standardized interface so that once you become familiar with the implementation of one cipher you can easily run all the ciphers. CAP also provides a wide range of analysis tools that allow you to test the resistance of most CAP ciphers to cryptanalysis and to discover weaknesses that may be exploited in those ciphers. The usefulness of CAP is reflected in the problems at the end of each chapter. The problem sets are unique and, at times, challenging because they rely on your access to CAP Above all, CAP is fun. It comes with a game feature so you can continue to test your cryptographic skills after you complete the text material. The CAP website (previously referenced) will contain additional challenges and post readers' high scores (if you will send in your game scores).
I hope you find the study of cryptography as interesting and rewarding as I found the writing of this book.
RICHARD J. SPILLMAN
Pacific Lutheran University
Tacoma, WA
Read More Show Less

Introduction

The goal of this book is to introduce you to the fascinating world of cryptography. It is a multifaceted world--for some, it is a world of spies and secrets. For others, it is a world of mathematics and computers. Anyway you look at it, cryptography has an air of mystery and adventure. It also transcends traditional academic disciplines. It is not just a computer-science topic--the study of cryptography involves history, political science, engineering, languages, military science, ethics, mathematics, and technology. No single text could cover cryptography from all these perspectives, so the true student of cryptography must be prepared to develop a broad educational background. This book will only serve as the starting point for a long and satisfying search for knowledge and understanding of this very complicated, yet rewarding, topic.

Two overall principles guided the writing of this book. The first is that cryptography did not begin with the invention of the computer. While contemporary ciphers are all computer based, they owe a lot to the early work of the developers of classical ciphers. These developers had to work by hand using paper and pencil to discover weaknesses in the classical ciphers. Without the aid of a computer or even a calculator, they had to train their minds to recognize patterns and to organize data. Hence, to learn how to "think" like a cryptographer, you need to understand and appreciate the cleverness and patience that underlie the classical systems.

The second guiding principle is that a course in cryptography is not (and should not be) a programming course. While it may be helpful for students to write one or two programs that implement acipher or an analysis tool, the time it would take learning how to write and debug code for all the important ciphers and tools would significantly reduce the time available to learn the real substance of cryptology. The task of writing cipher programs should be part of an algorithms or programming course. Hence, this book comes with a software package, Cryptographic Analysis Program (CAP), that provides access to both classical and contemporary ciphers. It also contains a set of tools for the analysis of those ciphers. The combination of the text and the software will give you real hands-on experience.

Beginning students, hobbyists, and advanced students should find something worthwhile in this text and its accompanying software program, CAP Part One covers classical issues in cryptography and is a good place for those new to the field to begin their study. More advanced students may want to quickly scan this part for information on running CAP and perhaps spend more time on those classical ciphers or analysis techniques that are unfamiliar. Part Two covers contemporary ciphers including stream, block, and public key systems. This is the section that the more advanced students will find most useful. Part Three considers the future of cryptography and provides a short introduction to quantum systems. The world of quantum computing is so strange that it challenges our view of how the universe operates. This section is really for those who can abandon all common sense, be they beginning or advanced students.

There is a Web page for this book, which can be found at plu.edu/~spillmrj. (Follow the CAP pointers.) It contains a set of PowerPoint files which are designed for lectures. Instructors also have access to answers to the problems in the book as well as additional problems and test questions.

The single most unique feature of this text is the accompanying software package, CAP. Together, CAP and the text are designed to create a complete learning environment. As you read about a particular cipher system, CAP allows you to explore the operation of that system. As you study an analysis technique, CAP allows you to experiment with it. CAP implements 30 different ciphers following a standardized interface so that once you become familiar with the implementation of one cipher you can easily run all the ciphers. CAP also provides a wide range of analysis tools that allow you to test the resistance of most CAP ciphers to cryptanalysis and to discover weaknesses that may be exploited in those ciphers. The usefulness of CAP is reflected in the problems at the end of each chapter. The problem sets are unique and, at times, challenging because they rely on your access to CAP Above all, CAP is fun. It comes with a game feature so you can continue to test your cryptographic skills after you complete the text material. The CAP website (previously referenced) will contain additional challenges and post readers' high scores (if you will send in your game scores).

I hope you find the study of cryptography as interesting and rewarding as I found the writing of this book.

RICHARD J. SPILLMAN
Pacific Lutheran University
Tacoma, WA

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
  • Anonymous

    Posted June 19, 2006

    use hashing instead of a full cipher, if possible

    Spillman makes the good point early in this book that cryptology is not restricted to the current computer era. Prior to computers, many ingenious classical schemes were devised. And the successful cryptographer had to develop an intuition without the aid of a fast computer by her side. Accordingly, Spillman splits his narrative into 3 parts. The first is on classical methods, starting with the Caesar cipher. All these could and were first done without computers. The second part involves only computer-based ciphers. Notably the public key systems first and still foremost embodied by RSA. He also goes into important related ideas like one way hash functions explaining the 2 most important, MD5 and SHA-1. Readers should note carefully that if they are faced with a problem where hashing is adequate, instead of needed a full encrypt and decrypt cipher, then they should use hashing. It is far simpler, since it does not involve issues of key management and revocation. And hashing is usually quicker than a full cipher, which is another important advantage. Also worth noting is that the book comes with a CD of custom code. This is called CAP by the text. It is a program that lets you encipher and decipher text that you can input. There is a choice of ciphers, as described in the book. Neat way to avoid some of the tedious low level computational steps. It lets you concentrate on understanding a cipher at a higher level.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)