Modern Cryptography: Applied Mathematics for Encryption and Information Security - Chuck Easttom

Modern Cryptography: Applied Mathematics for Encryption and Information Security

(Autor)

Buch | Softcover
416 Seiten
2015
McGraw-Hill Education (Verlag)
978-1-259-58808-2 (ISBN)
59,80 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required
A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today’s data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors.



Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphersUnderstand asymmetric cryptography algorithmsDesign s-boxes that maximize output non-linearityDeploy cryptographic hashesCreate cryptographic keys using pseudo random number generatorsEncrypt Web traffic using SSL/TLSSecure VPN, WiFi, and SSH communicationsWork with cryptanalysis and steganography Explore government, military, and intelligence agency applications

Chuck Easttom (Plano, TX), CISSP, CEH, CHFI, is President and Chief Consultant for CEC-Security, which specializes in IT training and litigation consulting. Chuck has more than 18 years in the IT industry with 10 years of teaching and professional training experience and 10 years in litigation support/expert witness work. Chuck hold seven provisional computer science patents and has authored 15 books, including System Forensics, Investigation And Response, Second Edition, Computer Security Fundamentals, and Computer Crime, Investigation, and the Law.

Section I: Foundations
Chapter 1: History of Cryptography to the 1800's
Chapter 2: History of Cryptography from the 1800's
Chapter 3: Basic Information Theory
Chapter 4: Essential Number Theory and Discrete Math
Chapter 5: Essential Algebra

Section II: Symmetric Ciphers and Hashes
Chapter 6: Feistel Networks
Chapter 7: Substitution-Permutation Networks
Chapter 8: S-Box Design
Chapter 9: Cryptographic Hashes

Section III: Asymmetric Ciphers
Chapter 10: Common Algorithms
Chapter 11: ECC

Section IV: Applications
Chapter 12: Random Number Generators
Chapter 13: SSL/TLS
Chapter 14: VPNs
Chapter 15: Military Applications
Chapter 16: Steganography
Chapter 17: Cryptanalysis
Chapter 18: Cryptographic Backdoors
Chapter 19: The Future of Cryptography

Section V: Appendices
Appendix A: Implementing Cryptography

Erscheint lt. Verlag 16.10.2015
Zusatzinfo 125 Illustrations, unspecified
Verlagsort OH
Sprache englisch
Maße 185 x 231 mm
Gewicht 716 g
Themenwelt Schulbuch / Wörterbuch Lexikon / Chroniken
Sonstiges Geschenkbücher
Informatik Netzwerke Sicherheit / Firewall
Informatik Theorie / Studium Kryptologie
ISBN-10 1-259-58808-4 / 1259588084
ISBN-13 978-1-259-58808-2 / 9781259588082
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich

von Chaos Computer Club

Buch | Softcover (2024)
KATAPULT Verlag
28,00