Cryptography Demystified / Edition 1

Cryptography Demystified / Edition 1

by John Hershey, J. E. Hershey
     
 

View All Available Formats & Editions

ISBN-10: 0071406387

ISBN-13: 9780071406383

Pub. Date: 08/23/2002

Publisher: McGraw-Hill Professional Publishing

AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY

Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom developers. If you

Overview

AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY

Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics—but dread the thick tomes that are your only other option—help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that’s actually fun to use.

You must read this book if—

* You prefer your simplifications from an expert who understands the complexities

* 6 years of success as a short course for students and professionals works for you

* you enjoy hearing the phrase “nothing to memorize”

* ecommerce, email, network security, or wireless communications is part of your bailiwick

* cracking cryptography means a jump up the career ladder

* the words “public-key cryptography,” “channel-based cryptography,” and “prime numbers” pique your interest

* best-practices cryptography is the only secure way for you—and your company—to go

One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial—the first to make the basics of the science truly accessible.

Product Details

ISBN-13:
9780071406383
Publisher:
McGraw-Hill Professional Publishing
Publication date:
08/23/2002
Series:
Demystified Series
Pages:
356
Product dimensions:
7.40(w) x 9.30(h) x 0.72(d)

Table of Contents

Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY

Module 1 First Considerations
Exercise 1

Module 2 Plaintext
Exercise 2

Module 3 Digitization of Plaintext
Exercise 3

Module 4 Toward a Cryptographic Paradigm
Exercise 4

Module 5 What We Want from the Keytext
Exercise 5

Module 6 Randomness I
Exercise 6

Module 7 Finite State Sequential Machines
Exercise 7 Transition Matrix

Module 8 m-sequences
Exercise 8

Module 9 The Paradigm Attempted
Exercise 9

Module 10 The Block Cipher Function - A Modern Keystoneto the Paradigm
Exercise 10

Module 11 Confidentiality Modes: ECB and CTR
Exercise 11

Module 12 Confidentiality Mode: Output Feedback (OFB)
Exercise 12

Module 13 Confidentiality Modes: Cipher Feedback (CFB)and Cipher Block Chaining (CBC)
Exercise 13
Part II NUMBER THEORY WE WILL NEED

Module 14 Prime Numbers I
Exercise 14

Module 15 Congruences
Exercise 15

Module 16 Euler-Fermat Theorem
Exercise 16

Module 17 The Euler Phi (f) Function
Exercise 17

Module 18 The Binary Exponentiation Algorithm
Exercise 18

Module 19 The Extended Euclidean Algorithm
Exercise 19

Module 20 Primitive Roots
Exercise 20

Module 21 Chinese Remainder Theorem
Exercise 21
Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY

Module 22 Merkle's Puzzle
Exercise 22

Module 23 The Diffie-Hellman Public Key Cryptographic System
Exercise 23

Module 24 Split Search
Exercise 24

Module 25 A Variant of the Diffie-Hellman System
Exercise 25

Module 26 The RSA Public Key Cryptographic System
Exercise 26

Module 27 Prime Numbers II
Exercise 27
Part IV KEYING VARIABLES

Module 28 Keying Variable Distribution
Exercise 28

Module 29 Secret Sharing
Exercise 29

Module 30 Randomness II
Exercise 30

Module 31 Cryptovariables
Exercise 31
Part V CRYPTO-OBSOLESCENCE

Module 32 The Aging Cryptoalgorithm
Exercise 32

Module 33 SUPERDES(tm)
Exercise 33
Part VI CHANNEL-BASED CRYPTOGRAPHY

Module 34 The Channel Is the Cryptovariable
Exercise 34

Module 35 The Quantum Cryptographic Channel
Exercise 35
Answers to Exercises
Glossary
Index

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >