Cryptography Demystified / Edition 1

Paperback (Print)
Used and New from Other Sellers
Used and New from Other Sellers
from $2.09
Usually ships in 1-2 business days
(Save 96%)
Other sellers (Paperback)
  • All (12) from $2.09   
  • New (6) from $30.50   
  • Used (6) from $2.09   

Overview

AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY

Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics—but dread the thick tomes that are your only other option—help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that’s actually fun to use.

You must read this book if—

* You prefer your simplifications from an expert who understands the complexities

* 6 years of success as a short course for students and professionals works for you

* you enjoy hearing the phrase “nothing to memorize”

* ecommerce, email, network security, or wireless communications is part of your bailiwick

* cracking cryptography means a jump up the career ladder

* the words “public-key cryptography,” “channel-based cryptography,” and “prime numbers” pique your interest

* best-practices cryptography is the only secure way for you—and your company—to go

One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial—the first to make the basics of the science truly accessible.

Read More Show Less

Product Details

  • ISBN-13: 9780071406383
  • Publisher: McGraw-Hill Professional Publishing
  • Publication date: 8/23/2002
  • Series: Demystified Series
  • Edition number: 1
  • Pages: 356
  • Sales rank: 1,294,016
  • Product dimensions: 7.40 (w) x 9.30 (h) x 0.72 (d)

Meet the Author

John E. Hershey has more than 30 years’ experience in telecom security. The author or co-author of five advanced texts: Hadamard Matrix Analysis and Synthesis : With Applications to Communications and Signal/Image Processing; The Elements of System Design; Data Transportation and Protection (Applications of Communications Theory); Perspectives in Spread Spectrum; and Doppler Applications in LEO Satellite Communication Systems, he was elected a Fellow of the IEEE “for contributions to secure communications” and currently teaches cryptography at Rensselaer Polytechnic Institute in Troy, New York. He lives in Ballston Lake, New York.

Read More Show Less

Table of Contents

Pt. I Introduction to Symmetric Cryptography 1
Module 1 First Considerations 3
Module 2 Plaintext 11
Module 3 Digitization of Plaintext 21
Module 4 Toward a Cryptographic Paradigm 31
Module 5 What We Want from the Keytext 37
Module 6 Randomness I 49
Module 7 Finite State Sequential Machines 59
Module 8 M-sequences 67
Module 9 The Paradigm Attempted 75
Module 10 The Block Cipher Function - A Modern Keystone to the Paradigm 83
Module 11 Confidentiality Modes: ECB and CTR 89
Module 12 Confidentiality Mode: Output Feedback (OFB) 97
Module 13 Confidentiality Modes: Cipher Feedback (CFB) and Cipher Block Chaining (CBC) 101
Pt. II Number Theory we will Need 109
Module 14 Prime Numbers I 111
Module 15 Congruences 119
Module 16 Euler-Fermat Theorem 125
Module 17 The Euler Phi ([phi]) Function 131
Module 18 The Bindary Exponentiation Algorithm 135
Module 19 The Extended Euclidean Algorithm 139
Module 20 Primitive Roots 145
Module 21 Chinese Remainder Theorem 151
Pt. III Introduction to Public Key Cryptography 155
Module 22 Markle's Puzzle 157
Module 23 The Diffie-Hellman Public Key Cryptographic System 161
Module 24 Split Search 167
Module 25 A Variant of the Diffie-Hellman System 173
Module 26 The RSA Public Key Cryptographic System 183
Module 27 Prime Numbers II 193
Pt. IV Keying Variables 199
Module 28 Keying Variable Distribution 201
Module 29 Secret Sharing 207
Module 30 Randomness II 215
Module 31 Cryptovariables 225
Pt. V Crypto-Obsolescence 233
Module 32 The Aging Cryptoalgorithm 235
Module 33 Superdes 247
Pt. VI Channel-Based Cryptography 259
Module 34 The Channel Is the Cryptovariable 261
Module 35 The Quantum Cryptographic Channel 269
Answers to Exercises 283
Glossary 343
Index 349
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)