Atjaunināt sīkdatņu piekrišanu

Brief History of Cryptology and Cryptographic Algorithms 2013 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 99 pages, height x width: 235x155 mm, weight: 1825 g, 33 Illustrations, black and white; XII, 99 p. 33 illus., 1 Paperback / softback
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 15-Oct-2013
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 331901627X
  • ISBN-13: 9783319016276
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 99 pages, height x width: 235x155 mm, weight: 1825 g, 33 Illustrations, black and white; XII, 99 p. 33 illus., 1 Paperback / softback
  • Sērija : SpringerBriefs in Computer Science
  • Izdošanas datums: 15-Oct-2013
  • Izdevniecība: Springer International Publishing AG
  • ISBN-10: 331901627X
  • ISBN-13: 9783319016276
Citas grāmatas par šo tēmu:
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.

Recenzijas

From the reviews:

The primary value of the work is for those interested in the development of DES and AES, or for those working on the key exchange issue, which lies at the heart of the RSA algorithm. It will also be useful for readers who might want to use it as a text in computer security courses, especially since that is how the author intended it in the first place. (G. Mick Smith, Computer Reviews, March, 2014)

1 Introduction: A Revolutionary Cipher
1(10)
1.1 A Traitorous Doctor
1(3)
1.2 A Few (Vocabulary) Words About Cryptology
4(1)
1.3 Codes
5(1)
1.4 Ciphers
6(1)
1.5 Substitution Ciphers
7(1)
1.6 Transposition Ciphers
8(3)
References
9(2)
2 Cryptology Before 1500: A Bit of Magic
11(8)
2.1 Veni, Vidi, Cipher
11(1)
2.2 Cryptology in the Middle Ages
12(1)
2.3 Frequency Analysis, the First Cryptanalytic Tool
12(7)
References
17(2)
3 The Black Chambers: 1500--1776
19(12)
3.1 Mary, Queen of Scots and the Spy master
19(4)
3.2 Nomenclators
23(1)
3.3 The Black Chambers
23(1)
3.4 The Next Complexity: Polyalphabetic Substitution
24(7)
References
29(2)
4 Crypto Goes to War: 1861--1865
31(12)
4.1 Technology Goes to War
31(1)
4.2 The Union Tries a Route
32(3)
4.3 Crypto for the Confederates
35(1)
4.4 Solving a Vigenere Cipher
36(7)
References
42(1)
5 Crypto and the War to End All Wars: 1914--1918
43(10)
5.1 The Americans Start from Behind
43(1)
5.2 America Catches Up
44(1)
5.3 The A.E.F in France
45(1)
5.4 Ciphers in the Great War: The Playfair
46(2)
5.5 Ciphers in the Great War: The ADFGVX Cipher
48(2)
5.6 A New Beginning
50(3)
References
51(2)
6 The Interwar Period 1919--1939
53(10)
6.1 Herbert O. Yardley and the Cipher Bureau
53(5)
6.2 William Friedman and the Signal Intelligence Service
58(5)
References
60(3)
7 The Coming of the Machines: 1918--1945
63(12)
7.1 Early Cipher Machines
63(1)
7.2 The Rotor Makes its Appearance
64(2)
7.3 How does the Enigma Work?
66(4)
7.4 Solving the Enigma: Turing, Marian, and the Bombe
70(1)
7.5 SIGABA: Friedman and Rowlett's Triumph
71(1)
7.6 How Does the SIGABA Work?
72(3)
References
74(1)
8 The Machines Take Over: Computer Cryptography
75(12)
8.1 The Shoulders of Giants
75(2)
8.2 Modern Computer Cipher Algorithms: The DES
77(5)
8.2.1 How Does the DES Work?
77(2)
8.2.2 The f() Function
79(1)
8.2.3 The Key Scheduler
79(1)
8.2.4 Discussion of DES
80(2)
8.3 The Advanced Encryption Standard
82(5)
References
85(2)
9 Alice and Bob and Whit and Martin: Public Key Crypto
87(10)
9.1 The Problem with Symmetric Ciphers
87(1)
9.2 Enter Whit and Martin
88(1)
9.3 The Key Exchange Problem
88(2)
9.4 Public-Key Cryptography Appears
90(1)
9.5 Authentication is a Problem Too
91(1)
9.6 Implementing Public-Key Cryptography: The RSA Algorithm
92(2)
9.6.1 RSA Key Generation
93(1)
9.6.2 Encrypting and Decrypting
94(1)
9.7 Analysis of RSA
94(1)
9.8 Applications of Public-Key Cryptography
94(3)
References
96(1)
Index 97