Muutke küpsiste eelistusi

E-raamat: Introduction to Cryptography

(University of Calgary, Alberta, Canada)
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 126,09 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Raamatukogudele
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

According to the followers of Pythagorus, "numbers rule the universe," and the undergraduate readers for whom this text is written will agree. Updating his text with recent discoveries (such as an unconditional deterministic polynomial-time algorithm for primality testing), popular references and eight appendices on computer arithmetic, Mollin (mathematics, U. of Calgary) covers the mathematical basics (including primes, induction, primitive roots, complexity, and the work of Euler, Fermat, Wilson, Legendre and Jacobi) and the cryptography basics (including ciphers, modes of operations and attacks) and includes the design elements of DES and AES, public-key cryptography (including ElGamal and digital envelopes), primality testing, factoring (including Pollard's algorithms), electronic mail and Internet security (including firewalls and cookies), and leading-edge applications such as login and network security, viruses and other infections, smart cards, and biometrics. Mollin also includes dozens of mini-biographies, including that of the aforesaid Pythagorus. Annotation ©2006 Book News, Inc., Portland, OR (booknews.com)

Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.

With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies, as well as applications, including login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography.

New to the Second Edition:
  • An introductory chapter that provides more information on mathematical facts and complexity theory
  • Expanded and updated exercises sets, including some routine exercises
  • More information on primality testing and cryptanalysis

    Accessible and logically organized, An Introduction to Cryptography, Second Edition is the essential book on the fundamentals of cryptography.
  • Arvustused

    "Mollin has written a very nice book. He presents a vast overview of cryptography, its history, and modern uses, which makes for interesting reading."

    In Siam Review, 2008, Vol. 50, No. 2

    Praise for the First Edition: "Mollin has written a readable text on a subject that can be challenging. It deserves your attention." - The Cryptogram

    "This is a great book! It can be used in many ways: for a university course at one extreme, and as selective light reading for pleasure at the other. The author's enthusiasm carries the reader along clearly and easily, spilling over to scores of fascinating, beautifully written footnotes, which include more than fifty mini-biographies. excellent and highly recommended." -Short Book Reviews, Vol. 21, No. 2, August 2001

    "I want to congratulate you on An Introduction to Cryptography. This is a fine addition to the field. Upon my recommendation, my personal firm has purchased several copies, it's so great. Your explanation in the section of 'Coin Flipping via Exponentiation' was brilliantly orchestrated." -Owen Henry Cupp, Southern Sovereign Institute, Georgia, USA

    "In this very nice book, the author introduces at an undergraduate level the following topics: Origins, computer arithmetic, and complexity . This book pays a lot of attention to the history of this research field, which makes the reading very enjoyable" -Zentralblatt fur Mathematik

    Preface ix
    1 Mathematical Basics 1(78)
    1.1 Divisibility
    1(5)
    1.2 Primes, Primality Testing, and Induction
    6(11)
    1.3 An Introduction to Congruences
    17(18)
    1.4 Euler, Fermat, and Wilson
    35(9)
    1.5 Primitive Roots
    44(7)
    1.6 The Index Calculus and Power Residues
    51(7)
    1.7 Legendre, Jacobi, & Quadratic Reciprocity
    58(9)
    1.8 Complexity
    67(12)
    2 Cryptographic Basics 79(52)
    2.1 Definitions and Illustrations
    79(12)
    2.2 Classic Ciphers
    91(18)
    2.3 Stream Ciphers
    109(6)
    2.4 LFSRs
    115(7)
    2.5 Modes of Operation
    122(5)
    2.6 Attacks
    127(4)
    3 DES and AES 131(26)
    3.1 S-DES and DES
    131(21)
    3.2 AES
    152(5)
    4 Public-Key Cryptography 157(32)
    4.1 The Ideas Behind PKC
    157(8)
    4.2 Digital Envelopes and PKCs
    165(7)
    4.3 RSA
    172(9)
    4.4 ElGamal
    181(6)
    4.5 DSA The DSS
    187(2)
    5 Primality Testing 189(18)
    5.1 True Primality Tests
    189(9)
    5.2 Probabilistic Primality Tests
    198(6)
    5.3 Recognizing Primes
    204(3)
    6 Factoring 207(16)
    6.1 Classical Factorization Methods
    207(4)
    6.2 The Continued Fraction Algorithm
    211(3)
    6.3 Pollard's Algorithms
    214(3)
    6.4 The Quadratic Sieve
    217(3)
    6.5 The Elliptic Curve Method (ECM)
    220(3)
    7 Electronic Mail and Internet Security 223(40)
    7.1 History of the Internet and the WWW
    223(4)
    7.2 Pretty Good Privacy (PGP)
    227(14)
    7.3 Protocol Layers and SSL
    241(9)
    7.4 Internetworking and Security Firewalls
    250(9)
    7.5 Client–Server Model and Cookies
    259(4)
    8 Leading-Edge Applications 263(35)
    8.1 Login and Network Security
    263(10)
    8.2 Viruses and Other Infections
    273(13)
    8.3 Smart Cards
    286(8)
    8.4 Biometrics
    294(4)
    Appendix A: Fundamental Facts 298(27)
    Appendix B: Computer Arithmetic 325(10)
    Appendix C: The Rijndael S-Box 335(2)
    Appendix D: Knapsack Ciphers 337(7)
    Appendix E: Silver-Pohlig-Hellman Algorithm 344(2)
    Appendix F: SHA-1 346(4)
    Appendix G: Radix-64 Encoding 350(2)
    Appendix H: Quantum Cryptography 352(6)
    Solutions to Odd-Numbered Exercises 358(19)
    Bibliography 377(7)
    List of Symbols 384(1)
    Index 384(29)
    About the Author 413
    Richard A. Mollin