Cryptology - Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon

Cryptology

Classical and Modern
Buch | Softcover
496 Seiten
2023 | 2nd edition
Chapman & Hall/CRC (Verlag)
978-1-032-47592-9 (ISBN)
54,85 inkl. MwSt
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.
Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods.



The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.



Features:










Requires no prior programming knowledge or background in college-level mathematics







Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code







Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication







Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenère, and Hill

Richard E. Klima is a professor in the Department of Mathematical Sciences at Appalachian State University. Prior to Appalachian State, Dr. Klima was a cryptologic mathematician at the National Security Agency. He earned a Ph.D. in applied mathematics from North Carolina State University. His research interests include cryptology, error-correcting codes, applications of linear and abstract algebra, and election theory. Neil P. Sigmon is a professor in the Department of Mathematics and Statistics at Radford University. Dr. Sigmon earned a Ph.D. in applied mathematics from North Carolina State University. His research interests include cryptology, the use of technology to illustrate mathematical concepts, and applications of linear and abstract algebra.

1. Introduction to Cryptology



Basic Terminology



Cryptology in Practive



Why Study Cryptology?



2. Substitution Ciphers



Keyword Substitution Ciphers



Cryptanalysis of Substitution Cipher



Playrair Ciphers



The Navajo Code



3. Transposition Ciphers



Columnar Transposition Ciphers



Cryptanalysis of Transposition Ciphers



ADFGX and ADFGVX Ciphers



4. The Enigma Machine



The Enigma Cipher Machine



Combinatorics



Security of the Enigma Machine



5. The Turing Bombe



Cribs and Menus



Loops and Logical Inconsistencies



Searching for the Correct Configuration



The Diagonal Board



The Checking Machine



Turnovers



Clonking



Final Observations



6. Shift and Affine Ciphers



Modular Arithmetic



Shift Ciphers



Cryptanalysis of Shift Ciphers



Affine Ciphers



Cryptanalysis of Affine Ciphers



7. Alberti and Vigenere Ciphers



Alberti Ciphers



Vigenere Ciphers



Probability



The Friedman Test



The Kasiski Test



Cryptanalyis of Vigenere Keyword Ciphers



8. Hill Ciphers



Matrices



Hill Ciphers



Cryptanalyis of Hill Ciphers



9. RSA Ciphers



Introduction to Public-Key Ciphers



Introduction to RSA Ciphers



The Euclidean Algorithm



Modular Exponentiation



ASCII



RSA Ciphers



Cryptanalyis of RSA Ciphers



Primality Testing



Integer Factorization



The RSA Factoring Challenges



10. ElGamal Ciphers



The Diffie-Hellman Key Exchange



Discrete Logarithms



ElGamal Ciphers



Cryptanalyis of ElGamal Ciphers



11. The Advanced Encryption Standard



Representations of Numbers



Sream Ciphers



AES Preliminaries



AES Encryption



AES Decryption



AES Security



12. Message Authentication



RSA Signatures



Hash Functions



RSA Signatures with Hashing



The Man-in-the-Middle Attack



Public-Key Infrastructures



Bibliography



Hints and Answers for Selected Exercises



Index

Erscheinungsdatum
Reihe/Serie Chapman & Hall/CRC Cryptography and Network Security Series
Zusatzinfo 43 Illustrations, black and white
Sprache englisch
Maße 156 x 234 mm
Gewicht 780 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Theorie / Studium
Recht / Steuern Privatrecht / Bürgerliches Recht IT-Recht
ISBN-10 1-032-47592-7 / 1032475927
ISBN-13 978-1-032-47592-9 / 9781032475929
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95