Cryptology : (Record no. 74045)

000 -LEADER
fixed length control field 05518nam a2200673Ii 4500
001 - CONTROL NUMBER
control field 9781315170664
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220531132549.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190122s2018 fluab ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781315170664(e-book : PDF)
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)1076543437
040 ## - Cataloging Source
-- FlBoTFG
-- FlBoTFG
-- rda
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5102.94
072 #7 -
-- COM
-- 083000
-- bisacsh
072 #7 -
-- MAT
-- 025000
-- bisacsh
072 #7 -
-- MAT
-- 036000
-- bisacsh
072 #7 -
-- PBD
-- bicscc
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Klima, Richard,
Relator term author.
245 10 - TITLE STATEMENT
Title Cryptology :
Remainder of title Classical and Modern /
Statement of responsibility, etc. by Richard Klima, Richard E. Klima, Neil Sigmon and Neil P. Sigmon.
250 ## - EDITION STATEMENT
Edition statement Second edition.
264 #1 -
-- Boca Raton, FL :
-- Chapman and Hall/CRC,
-- 2018.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (496 pages) :
Other physical details 149 illustrations, text file, PDF.
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
490 1# -
-- Chapman & Hall/CRC Cryptography and Network Security Series
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 00 -
-- 1. Introduction to Cryptology -- Basic Terminology -- Cryptology in Practive -- Why Study Cryptology? -- 2. Substitution Ciphers -- Keyword Substitution Ciphers -- Cryptanalysis of Substitution Cipher -- Playrair Ciphers -- The Navajo Code -- 3. Transposition Ciphers -- Columnar Transposition Ciphers -- Cryptanalysis of Transposition Ciphers -- ADFGX and ADFGVX Ciphers -- 4. The Enigma Machine -- The Enigma Cipher Machine -- Combinatorics -- Security of the Enigma Machine -- 5. The Turing Bombe -- Cribs and Menus -- Loops and Logical Inconsistencies -- Searching for the Correct Configuration -- The Diagonal Board -- The Checking Machine -- Turnovers -- Clonking -- Final Observations -- 6. Shift and Affine Ciphers -- Modular Arithmetic -- Shift Ciphers -- Cryptanalysis of Shift Ciphers -- Affine Ciphers -- Cryptanalysis of Affine Ciphers -- 7. Alberti and Vigenere Ciphers -- Alberti Ciphers -- Vigenere Ciphers -- Probability -- The Friedman Test -- The Kasiski Test -- Cryptanalyis of Vigenere Keyword Ciphers -- 8. Hill Ciphers -- Matrices -- Hill Ciphers -- Cryptanalyis of Hill Ciphers -- 9. RSA Ciphers -- Introduction to Public-Key Ciphers -- Introduction to RSA Ciphers -- The Euclidean Algorithm -- Modular Exponentiation -- ASCII -- RSA Ciphers -- Cryptanalyis of RSA Ciphers -- Primality Testing -- Integer Factorization -- The RSA Factoring Challenges -- 10. ElGamal Ciphers -- The Diffie-Hellman Key Exchange -- Discrete Logarithms -- ElGamal Ciphers -- Cryptanalyis of ElGamal Ciphers -- 11. The Advanced Encryption Standard -- Representations of Numbers -- Sream Ciphers -- AES Preliminaries -- AES Encryption -- AES Decryption -- AES Security -- 12. Message Authentication -- RSA Signatures -- Hash Functions -- RSA Signatures with Hashing -- The Man-in-the-Middle Attack -- Public-Key Infrastructures -- Bibliography -- Hints and Answers for Selected Exercises -- Index.
520 3# -
-- Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.
530 ## -
-- Also available in print format.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element MATHEMATICS / Recreations & Games.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element MATHEMATICS / Combinatorics.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element classical ciphers.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element cryptanalysis.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element cryptographic algorithms.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element cryptology textbook.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Enigma cipher machine.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Introduction to Cryptology.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Maplet-based examples.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Message Authentication.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element mathematics in cryptology.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Navajo code.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element public-key cryptography.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element U.S. cryptographic standards.
Source of heading or term bisacsh
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Data processing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Ciphers.
655 #0 -
-- Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Klima, Richard E.,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sigmon, Neil,
Relator term author.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Sigmon, Neil P.,
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element Taylor and Francis.
776 08 -
-- Print version:
-- 9781138047624
830 #0 -
-- Chapman & Hall/CRC Cryptography and Network Security Series.
856 40 -
-- https://www.taylorfrancis.com/books/9781315170664
-- Click here to view

No items available.

Technical University of Mombasa
Tom Mboya Street, Tudor 90420-80100 , Mombasa Kenya
Tel: (254)41-2492222/3 Fax: 2490571