Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Na
Cryptology: classical and modern
β Scribed by Klima, Richard E.; Sigmon, Neil
- Publisher
- CRC Press
- Year
- 2019
- Tongue
- English
- Leaves
- 497
- Series
- Chapman & Hall/CRC cryptography and network security
- Edition
- Second edition
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Table of Contents
- Introduction to CryptologyBasic TerminologyCryptology in PractiveWhy Study Cryptology?2. Substitution CiphersKeyword Substitution CiphersCryptanalysis of Substitution CipherPlayrair CiphersThe Navajo Code3. Transposition CiphersColumnar Transposition CiphersCryptanalysis of Transposition CiphersADFGX and ADFGVX Ciphers4. The Enigma MachineThe Enigma Cipher MachineCombinatoricsSecurity of the Enigma Machine5. The Turing BombeCribs and MenusLoops and Logical InconsistenciesSearching for the Correct ConfigurationThe Diagonal BoardThe Checking MachineTurnoversClonkingFinal Observations6. Shift and Affine CiphersModular ArithmeticShift CiphersCryptanalysis of Shift CiphersAffine CiphersCryptanalysis of Affine Ciphers7. Alberti and Vigenere CiphersAlberti CiphersVigenere CiphersProbabilityThe Friedman TestThe Kasiski TestCryptanalyis of Vigenere Keyword Ciphers8. Hill CiphersMatricesHill CiphersCryptanalyis of Hill Ciphers9. RSA CiphersIntroduction to Public-Key CiphersIntroduction to RSA CiphersThe Euclidean AlgorithmModular ExponentiationASCIIRSA CiphersCryptanalyis of RSA CiphersPrimality TestingInteger FactorizationThe RSA Factoring Challenges10. ElGamal CiphersThe Diffie-Hellman Key ExchangeDiscrete LogarithmsElGamal CiphersCryptanalyis of ElGamal Ciphers11. The Advanced Encryption StandardRepresentations of NumbersSream CiphersAES PreliminariesAES EncryptionAES DecryptionAES Security12. Message AuthenticationRSA SignaturesHash FunctionsRSA Signatures with HashingThe Man-in-the-Middle AttackPublic-Key InfrastructuresBibliographyHints and Answers for Selected ExercisesIndex
β¦ Subjects
Ciphers;COMPUTERS / Security / Cryptography;Cryptography;Cryptography--Data processing;Data encryption (Computer science);Electronic books;Cryptography -- Data processing
π SIMILAR VOLUMES
Introduction to cryptology -- Substitution ciphers -- Transposition ciphers -- The enigma machine and Navajo code -- Shift and affine ciphers -- Alberti and VigeneΜre ciphers -- Hill ciphers -- RSA ciphers -- ElGamal ciphers -- The advanced encryption standard -- Message authentication.</div>
"This is a well-written textbook, one destined to become an undergraduate favorite in the fascinating and rewarding study of cryptology." — Atul Prakash, University of Michigan "Dr. Spillman's Cryptographic Analysis Program, (CAP), is not only a fantastic teaching tool, it's very useful to the