Cryptology Unlocked
John Wiley & Sons Ltd (Verlag)
978-0-470-06064-3 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
This new book introduces cryptography in a unique and non–mathematical style.
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non–mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code–breaking and attack algorithms.
Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way.
Join the cryptology adventure, and understand:
The difference between good and bad algorithms
Whether or not secret services can read all messages
The real–world affect cryptography had on World War II
The unspoken security risks behind digital mobile standards GSM and UMTS
The everyday implications on digital signatures, PINs and online banking
Reinhard Wobst studied mathematics at Technical University of Dresden and obtained his PhD in the field of scholastic processes in 1980. He now works as an independent programmer for scientific and industrial applications in C/C++ as well as script languages. In 1980, he conducted his first experiments with cryptographic algorithms. This hobby has led to numerous articles discussing cryptography, through to security consulting and security software development. All this writing has resulted in this book, which is now in its third edition in the original German and is published here in English for the first time.
Preface.
1. Introduction.
2. Cryptology from the Romans to World War II.
3. Cryptanalysis in Detail.
4. Development Milestones: DES, RSA.
5. Life After DES: New Methods, New Attacks.
6. Cryptographic Protocols.
7. Practical Applications.
8. Cryptology, Politics, and Business.
Glossary.
Appendix A.1. Sources of Information.
Appendix A.2. Bibliography.
Index.
Erscheint lt. Verlag | 6.7.2007 |
---|---|
Übersetzer | Angelika Shafir |
Verlagsort | Chichester |
Sprache | englisch |
Maße | 190 x 235 mm |
Gewicht | 1150 g |
Einbandart | Paperback |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
ISBN-10 | 0-470-06064-6 / 0470060646 |
ISBN-13 | 978-0-470-06064-3 / 9780470060643 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich