Cryptography and Secure Communication - Richard E. Blahut

Cryptography and Secure Communication

Buch | Hardcover
602 Seiten
2014
Cambridge University Press (Verlag)
978-1-107-01427-5 (ISBN)
109,95 inkl. MwSt
This fascinating book presents the timeless mathematical theory underpinning cryptosystems both old and new, written specifically with engineers in mind. Ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.
Today's pervasive computing and communications networks have created an intense need for secure and reliable cryptographic systems. Bringing together a fascinating mixture of topics in engineering, mathematics, computer science, and informatics, this book presents the timeless mathematical theory underpinning cryptosystems both old and new. Major branches of classical and modern cryptography are discussed in detail, from basic block and stream cyphers through to systems based on elliptic and hyperelliptic curves, accompanied by concise summaries of the necessary mathematical background. Practical aspects such as implementation, authentication and protocol-sharing are also covered, as are the possible pitfalls surrounding various cryptographic methods. Written specifically with engineers in mind, and providing a solid grounding in the relevant algorithms, protocols and techniques, this insightful introduction to the foundations of modern cryptography is ideal for graduate students and researchers in engineering and computer science, and practitioners involved in the design of security systems for communications networks.

Richard E. Blahut is the Henry Magnuski Professor of Electrical and Computer Engineering at the University of Illinois, Urbana-Champaign. He is a Fellow of the Institute of Electrical and Electronics Engineers and the recipient of many awards including the IEEE Alexander Graham Bell Medal (1998), the Tau Beta Pi Daniel C. Drucker Eminent Faculty Award, and the IEEE Millennium Medal. He was named a Fellow of IBM Corporation in 1980 (where he worked for over 30 years) and was elected to the US National Academy of Engineering in 1990.

1. Introduction; 2. The integers; 3. Cryptography based on the integer ring; 4. Cryptography based on the discrete logarithm; 5. Information-theoretic methods in cryptography; 6. Block ciphers; 7. Stream ciphers; 8. Authentication and ownership protection; 9. Groups, rings, and fields; 10. Cryptography based on elliptic curves; 11. Cryptography based on hyperelliptic curves; 12. Cryptography based on bilinear pairings; 13. Implementation; 14. Cryptographic protocols for security and identification; 15. More public-key cryptography.

Zusatzinfo Worked examples or Exercises; 77 Line drawings, unspecified
Verlagsort Cambridge
Sprache englisch
Maße 178 x 252 mm
Gewicht 1330 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
Technik Nachrichtentechnik
ISBN-10 1-107-01427-1 / 1107014271
ISBN-13 978-1-107-01427-5 / 9781107014275
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95