Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Na
Classical and Contemporary Cryptology
β Scribed by Richard J. Spillman
- Publisher
- Prentice Hall
- Year
- 2004
- Tongue
- English
- Leaves
- 267
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
"This is a well-written textbook, one destined to become an undergraduate favorite in the fascinating and rewarding study of cryptology." Atul Prakash, University of Michigan "Dr. Spillman's Cryptographic Analysis Program, (CAP), is not only a fantastic teaching tool, it's very useful to the cryptanalyst as well. I've used it in teaching a practical security course for the last four years." Scott Orr, Indiana University-Purdue University, Indianapolis Some people work hard at encoding their secrets; other people work just as hard at deciphering them. Students of cryptology must learn to understand the thinking and techniques of both sides. As Dr. Spillman explores the world of cryptology, he spans introductory to advanced topics, presenting the history and methodology of spies, code breakers, code talkers, and present-day computer hackers and attackers. The cryptographic analysis software included with the book enables students to perform simple hands-on activities that teach them to think like a cryptographer as they learn to fend off attacks or secure software systems. Important features: Coverage of both classical and contemporary cryptology allows students to learn current methods by understanding their origins in early work. The included CAP software package allows students to test their skills while instructors can add interesting new challenges. Stream cipher coverage lets students see how an important cipher is implemented in practice. Use of block ciphers in a network introduces students to the actual use of a cipher system. Charts ending each chapter illustrate how newly covered ciphers fit in and the interrelationships that exist between ciphers. Optional chapter on quantum computing offers advanced study topics.
β¦ Table of Contents
file:///C|/a.htm......Page 1
ζ¬ε°η£η......Page 0
ε€ε
Έε―η ε¦δΈη°δ»£ε―η ε¦.pdf......Page 2
file:///C|/a.htm......Page 267
π SIMILAR VOLUMES
<P>The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: - efficient distributed computation modulo a shared secret - multiparty computation - foundations of modern cryptography - provable security for pu
<P>The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: Efficient distributed computation modulo a shared secret, multiparty computation, modern cryptography, provable security for public key schemes, and
<p><P>The aim of this text is to treat selected topics of the subject of contemporary cryptology, structured in five quite independent but related themes: <BR>- efficient distributed computation modulo a shared secret<BR>- multiparty computation<BR>- foundations of modern cryptography<BR>- provable