Secret Key Cryptography
Manning Publications (Verlag)
978-1-63343-979-5 (ISBN)
In Secret Key Cryptography: Ciphers, from simple to unbreakable you will:
Measure the strength of your ciphers and learn how to guarantee their security
Construct and incorporate data-compression codes
Generate true random numbers in bulk
Construct huge primes and safe primes
Add an undetectable backdoor to a cipher
Defeat hypothetical ultracomputers that could be developed decades from now
Construct 30 unbreakable ciphers
Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers—even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS • Measure the strength of your ciphers and learn how to guarantee their security • Construct and incorporate data-compression codes • Generate true random numbers in bulk • Construct huge primes and safe primes • Add an undetectable backdoor to a cipher • Defeat hypothetical ultra computers that could be developed decades from now • Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required
table of contents detailed TOC READ IN LIVEBOOK 1 INTRODUCTION READ IN LIVEBOOK 2WHAT IS CRYPTOGRAPHY? READ IN LIVEBOOK 3PRELIMINARY CONCEPTS READ IN LIVEBOOK 4CRYPTOGRAPHER'S TOOLBOX READ IN LIVEBOOK 5SUBSTITUTION CIPHERS READ IN LIVEBOOK 6COUNTERMEASURES READ IN LIVEBOOK 7TRANSPOSITION READ IN LIVEBOOK 8JEFFERSON WHEEL CYPHER READ IN LIVEBOOK 9FRACTIONATION READ IN LIVEBOOK 10VARIABLE-LENGTH FRACTIONATION READ IN LIVEBOOK 11BLOCK CIPHERS READ IN LIVEBOOK 12PRINCIPLES FOR SECURE ENCRYPTION READ IN LIVEBOOK 13STREAM CIPHERS READ IN LIVEBOOK 14ONE-TIME PAD READ IN LIVEBOOK 15MATRIX METHODS READ IN LIVEBOOK 16THREE-PASS PROTOCOL READ IN LIVEBOOK 17CODES READ IN LIVEBOOK 18QUANTUM COMPUTERS READ IN LIVEBOOK 19 EPILOGUE READ IN LIVEBOOK 20 FUN PAGES CHALLENGE
Erscheinungsdatum | 24.08.2022 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 187 x 236 mm |
Gewicht | 595 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
ISBN-10 | 1-63343-979-8 / 1633439798 |
ISBN-13 | 978-1-63343-979-5 / 9781633439795 |
Zustand | Neuware |
Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich