𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cryptology: classical and modern

✍ Scribed by Klima, Richard E.; Sigmon, Neil


Publisher
CRC Press
Year
2019
Tongue
English
Leaves
497
Series
Chapman & Hall/CRC cryptography and network security
Edition
Second edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


  1. Introduction to CryptologyBasic TerminologyCryptology in PractiveWhy Study Cryptology?2. Substitution CiphersKeyword Substitution CiphersCryptanalysis of Substitution CipherPlayrair CiphersThe Navajo Code3. Transposition CiphersColumnar Transposition CiphersCryptanalysis of Transposition CiphersADFGX and ADFGVX Ciphers4. The Enigma MachineThe Enigma Cipher MachineCombinatoricsSecurity of the Enigma Machine5. The Turing BombeCribs and MenusLoops and Logical InconsistenciesSearching for the Correct ConfigurationThe Diagonal BoardThe Checking MachineTurnoversClonkingFinal Observations6. Shift and Affine CiphersModular ArithmeticShift CiphersCryptanalysis of Shift CiphersAffine CiphersCryptanalysis of Affine Ciphers7. Alberti and Vigenere CiphersAlberti CiphersVigenere CiphersProbabilityThe Friedman TestThe Kasiski TestCryptanalyis of Vigenere Keyword Ciphers8. Hill CiphersMatricesHill CiphersCryptanalyis of Hill Ciphers9. RSA CiphersIntroduction to Public-Key CiphersIntroduction to RSA CiphersThe Euclidean AlgorithmModular ExponentiationASCIIRSA CiphersCryptanalyis of RSA CiphersPrimality TestingInteger FactorizationThe RSA Factoring Challenges10. ElGamal CiphersThe Diffie-Hellman Key ExchangeDiscrete LogarithmsElGamal CiphersCryptanalyis of ElGamal Ciphers11. The Advanced Encryption StandardRepresentations of NumbersSream CiphersAES PreliminariesAES EncryptionAES DecryptionAES Security12. Message AuthenticationRSA SignaturesHash FunctionsRSA Signatures with HashingThe Man-in-the-Middle AttackPublic-Key InfrastructuresBibliographyHints and Answers for Selected ExercisesIndex

✦ Subjects


Ciphers;COMPUTERS / Security / Cryptography;Cryptography;Cryptography--Data processing;Data encryption (Computer science);Electronic books;Cryptography -- Data processing


πŸ“œ SIMILAR VOLUMES


Cryptology: Classical And Modern
✍ Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon πŸ“‚ Library πŸ“… 2019 πŸ› Chapman & Hall/CRC Press/Taylor & Francis Group 🌐 English

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Na

Cryptology classical and modern with map
✍ Klima, Richard E.;Sigmon, Neil πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

Introduction to cryptology -- Substitution ciphers -- Transposition ciphers -- The enigma machine and Navajo code -- Shift and affine ciphers -- Alberti and VigeneΜ€re ciphers -- Hill ciphers -- RSA ciphers -- ElGamal ciphers -- The advanced encryption standard -- Message authentication.</div>

Classical and Contemporary Cryptology
✍ Richard J. Spillman πŸ“‚ Library πŸ“… 2004 πŸ› Prentice Hall 🌐 English

"This is a well-written textbook, one destined to become an undergraduate favorite in the fascinating and rewarding study of cryptology." &#151; Atul Prakash, University of Michigan "Dr. Spillman's Cryptographic Analysis Program, (CAP), is not only a fantastic teaching tool, it's very useful to the