000 05518nam a2200673Ii 4500
001 9781315170664
003 FlBoTFG
005 20220531132549.0
006 m o d
007 cr
008 190122s2018 fluab ob 001 0 eng d
020 _a9781315170664(e-book : PDF)
035 _a(OCoLC)1076543437
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aTK5102.94
072 7 _aCOM
_x083000
_2bisacsh
072 7 _aMAT
_x025000
_2bisacsh
072 7 _aMAT
_x036000
_2bisacsh
072 7 _aPBD
_2bicscc
100 1 _aKlima, Richard,
_eauthor.
245 1 0 _aCryptology :
_bClassical and Modern /
_cby Richard Klima, Richard E. Klima, Neil Sigmon and Neil P. Sigmon.
250 _aSecond edition.
264 1 _aBoca Raton, FL :
_bChapman and Hall/CRC,
_c2018.
300 _a1 online resource (496 pages) :
_b149 illustrations, text file, PDF.
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
490 1 _aChapman & Hall/CRC Cryptography and Network Security Series
504 _aIncludes bibliographical references and index.
505 0 0 _t1. Introduction to Cryptology -- Basic Terminology -- Cryptology in Practive -- Why Study Cryptology? -- 2. Substitution Ciphers -- Keyword Substitution Ciphers -- Cryptanalysis of Substitution Cipher -- Playrair Ciphers -- The Navajo Code -- 3. Transposition Ciphers -- Columnar Transposition Ciphers -- Cryptanalysis of Transposition Ciphers -- ADFGX and ADFGVX Ciphers -- 4. The Enigma Machine -- The Enigma Cipher Machine -- Combinatorics -- Security of the Enigma Machine -- 5. The Turing Bombe -- Cribs and Menus -- Loops and Logical Inconsistencies -- Searching for the Correct Configuration -- The Diagonal Board -- The Checking Machine -- Turnovers -- Clonking -- Final Observations -- 6. Shift and Affine Ciphers -- Modular Arithmetic -- Shift Ciphers -- Cryptanalysis of Shift Ciphers -- Affine Ciphers -- Cryptanalysis of Affine Ciphers -- 7. Alberti and Vigenere Ciphers -- Alberti Ciphers -- Vigenere Ciphers -- Probability -- The Friedman Test -- The Kasiski Test -- Cryptanalyis of Vigenere Keyword Ciphers -- 8. Hill Ciphers -- Matrices -- Hill Ciphers -- Cryptanalyis of Hill Ciphers -- 9. RSA Ciphers -- Introduction to Public-Key Ciphers -- Introduction to RSA Ciphers -- The Euclidean Algorithm -- Modular Exponentiation -- ASCII -- RSA Ciphers -- Cryptanalyis of RSA Ciphers -- Primality Testing -- Integer Factorization -- The RSA Factoring Challenges -- 10. ElGamal Ciphers -- The Diffie-Hellman Key Exchange -- Discrete Logarithms -- ElGamal Ciphers -- Cryptanalyis of ElGamal Ciphers -- 11. The Advanced Encryption Standard -- Representations of Numbers -- Sream Ciphers -- AES Preliminaries -- AES Encryption -- AES Decryption -- AES Security -- 12. Message Authentication -- RSA Signatures -- Hash Functions -- RSA Signatures with Hashing -- The Man-in-the-Middle Attack -- Public-Key Infrastructures -- Bibliography -- Hints and Answers for Selected Exercises -- Index.
520 3 _aCryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.
530 _aAlso available in print format.
650 7 _aMATHEMATICS / Recreations & Games.
_2bisacsh
650 7 _aMATHEMATICS / Combinatorics.
_2bisacsh
650 7 _aclassical ciphers.
_2bisacsh
650 7 _acryptanalysis.
_2bisacsh
650 7 _acryptographic algorithms.
_2bisacsh
650 7 _acryptology textbook.
_2bisacsh
650 7 _aEnigma cipher machine.
_2bisacsh
650 7 _aIntroduction to Cryptology.
_2bisacsh
650 7 _aMaplet-based examples.
_2bisacsh
650 7 _aMessage Authentication.
_2bisacsh
650 7 _amathematics in cryptology.
_2bisacsh
650 7 _aNavajo code.
_2bisacsh
650 7 _apublic-key cryptography.
_2bisacsh
650 7 _aU.S. cryptographic standards.
_2bisacsh
650 0 _aCryptography.
650 0 _aCryptography
_xData processing.
650 0 _aData encryption (Computer science)
650 0 _aCiphers.
655 0 _aElectronic books.
700 1 _aKlima, Richard E.,
_eauthor.
700 1 _aSigmon, Neil,
_eauthor.
700 1 _aSigmon, Neil P.,
_eauthor.
710 2 _aTaylor and Francis.
776 0 8 _iPrint version:
_z9781138047624
830 0 _aChapman & Hall/CRC Cryptography and Network Security Series.
856 4 0 _uhttps://www.taylorfrancis.com/books/9781315170664
_zClick here to view
999 _c74045
_d74045