𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cryptology: classical and modern

✍ Scribed by Klima, Richard E.; Sigmon, Neil


Publisher
CRC Press
Year
2019
Tongue
English
Leaves
497
Series
Chapman & Hall/CRC cryptography and network security
Edition
Second edition
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Table of Contents


Cover......Page 1
Half Title......Page 2
Title Page......Page 4
Copyright Page......Page 5
Table of Contents......Page 6
Preface......Page 12
1: Introduction to Cryptology......Page 16
1.2 Cryptology in Practice......Page 17
1.3 Why Study Cryptology?......Page 19
2.1 Keyword Substitution Ciphers......Page 22
2.1.1 Simple Keyword Substitution Ciphers......Page 23
2.1.2 Keyword Columnar Substitution Ciphers......Page 24
2.1.3 Exercises......Page 25
2.2 Cryptanalysis of Substitution Ciphers......Page 26
2.2.1 Exercises......Page 32
2.3 Playfair Ciphers......Page 34
2.3.1 Exercises......Page 36
2.4 The Navajo Code......Page 37
2.4.1 Exercises......Page 42
3.1 Columnar Transposition Ciphers......Page 44
3.1.1 Simple Columnar Transposition Ciphers......Page 45
3.1.2 Keyword Columnar Transposition Ciphers......Page 47
3.1.3 Exercises......Page 49
3.2.1 Cryptanalysis of Simple Columnar Ciphers......Page 51
3.2.2 Cryptanalysis of Keyword Columnar Ciphers......Page 53
3.2.3 Exercises......Page 55
3.3 ADFGX and ADFGVX Ciphers......Page 56
3.3.1 Exercises......Page 59
4.1 The Enigma Cipher Machine......Page 62
4.1.1 Exercises......Page 76
4.2.1 The Multiplication Principle......Page 80
4.2.2 Permutations......Page 82
4.2.3 Combinations......Page 85
4.2.4 Exercises......Page 87
4.3.1 Number of Initial Configurations......Page 90
4.3.2 Background on Cryptanalysis......Page 93
4.3.3 Exercises......Page 96
5.1 Cribs and Menus......Page 98
5.1.1 Exercises......Page 103
5.2 Loops and Logical Inconsistencies......Page 105
5.3 Searching for the Correct Configuration......Page 107
5.3.1 Exercises......Page 121
5.4 The Diagonal Board......Page 129
5.4.1 Exercises......Page 135
5.5 The Checking Machine......Page 139
5.5.1 Exercises......Page 145
5.6 Turnovers......Page 154
5.6.1 Exercises......Page 158
5.7 Clonking......Page 165
5.7.1 Exercises......Page 170
5.8 Final Observations......Page 179
5.8.1 Exercises......Page 181
6.1 Modular Arithmetic......Page 182
6.1.1 Exercises......Page 191
6.2 Shift Ciphers......Page 193
6.2.1 Exercises......Page 196
6.3 Cryptanalysis of Shift Ciphers......Page 198
6.3.1 Exercises......Page 200
6.4 Affine Ciphers......Page 202
6.4.1 Exercises......Page 204
6.5 Cryptanalysis of Affine Ciphers......Page 205
6.5.1 Exercises......Page 207
7: Alberti and Vigenère Ciphers......Page 210
7.1 Alberti Ciphers......Page 211
7.1.1 Exercises......Page 214
7.2.1 Vigenère Autokey Ciphers......Page 216
7.2.2 Vigenère Keyword Ciphers......Page 219
7.2.3 Exercises......Page 220
7.3 Probability......Page 222
7.3.1 Exercises......Page 228
7.4 The Friedman Test......Page 230
7.4.1 The Index of Coincidence......Page 231
7.4.2 Estimating the Keyword Length......Page 235
7.4.3 Exercises......Page 237
7.5 The Kasiski Test......Page 239
7.5.1 Exercises......Page 240
7.6 Cryptanalysis of Vigenère Keyword Ciphers......Page 241
7.6.1 Finding the Keyword Length Using Signatures......Page 243
7.6.2 Finding the Keyword Letters Using Scrawls......Page 248
7.6.3 Exercises......Page 252
8.1 Matrices......Page 264
8.1.1 Definition and Basic Terminology......Page 265
8.1.2 Matrix Operations......Page 266
8.1.3 Identity and Inverse Matrices......Page 271
8.1.4 Matrices with Modular Arithmetic......Page 274
8.1.5 Exercises......Page 277
8.2 Hill Ciphers......Page 281
8.2.1 Exercises......Page 288
8.3 Cryptanalysis of Hill Ciphers......Page 290
8.3.1 Exercises......Page 294
9.1 Introduction to Public-Key Ciphers......Page 298
9.1.1 Exercises......Page 300
9.2 Introduction to RSA Ciphers......Page 301
9.3 The Euclidean Algorithm......Page 304
9.3.1 Exercises......Page 309
9.4 Modular Exponentiation......Page 311
9.5 ASCII......Page 316
9.5.1 Exercise......Page 317
9.6 RSA Ciphers......Page 318
9.6.1 Exercises......Page 322
9.7 Cryptanalysis of RSA Ciphers......Page 324
9.7.1 Exercises......Page 327
9.8 Primality Testing......Page 329
9.8.1 Exercises......Page 332
9.9 Integer Factorization......Page 333
9.10 The RSA Factoring Challenges......Page 336
9.10.1 Exercises......Page 337
10: ElGamal Ciphers......Page 338
10.1 The Diffie-Hellman Key Exchange......Page 339
10.1.1 Exercises......Page 341
10.2 Discrete Logarithms......Page 343
10.2.1 Exercises......Page 345
10.3 ElGamal Ciphers......Page 346
10.3.1 Exercises......Page 352
10.4 Cryptanalysis of ElGamal Ciphers......Page 354
10.4.1 Exercises......Page 358
11.1 Representations of Numbers......Page 360
11.1.1 Binary......Page 361
11.1.2 Hexadecimal......Page 364
11.1.3 Exercises......Page 367
11.2 Stream Ciphers......Page 369
11.2.1 Exercises......Page 373
11.3 AES Preliminaries......Page 375
11.3.1 Plaintext Format......Page 376
11.3.2 The S-Box......Page 377
11.3.3 Key Format and Generation......Page 379
11.3.4 Exercises......Page 385
11.4 AES Encryption......Page 386
11.4.1 Overview......Page 387
11.4.2 The Operations......Page 388
11.4.3 Exercises......Page 395
11.5 AES Decryption......Page 398
11.5.1 Exercises......Page 408
11.6 AES Security......Page 411
11.6.1 Exercises......Page 412
12: Message Authentication......Page 414
12.1 RSA Signatures......Page 415
12.1.1 Exercises......Page 421
12.2 Hash Functions......Page 424
12.2.1 Exercises......Page 429
12.3 RSA Signatures with Hashing......Page 432
12.3.1 Exercises......Page 435
12.4 The Man-in-the-Middle Attack......Page 438
12.4.1 Exercises......Page 440
12.5 Public-Key Infrastructures......Page 441
12.5.1 Key Formation......Page 442
12.5.2 Web of Trust......Page 443
12.5.3 X.509 Certificates......Page 444
12.5.4 Exercises......Page 447
Bibliography......Page 450
Hints and Answers for Selected Exercises......Page 452
Index......Page 484

✦ Subjects


Ciphers;COMPUTERS / Security / Cryptography;Cryptography;Cryptography--Data processing;Data encryption (Computer science);Electronic books;Cryptography -- Data processing


πŸ“œ SIMILAR VOLUMES


Cryptology: Classical And Modern
✍ Richard Klima, Richard E. Klima, Neil Sigmon, Neil P. Sigmon πŸ“‚ Library πŸ“… 2019 πŸ› Chapman & Hall/CRC Press/Taylor & Francis Group 🌐 English

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Na

Cryptology classical and modern with map
✍ Klima, Richard E.;Sigmon, Neil πŸ“‚ Library πŸ“… 2013 πŸ› CRC Press 🌐 English

Introduction to cryptology -- Substitution ciphers -- Transposition ciphers -- The enigma machine and Navajo code -- Shift and affine ciphers -- Alberti and VigeneΜ€re ciphers -- Hill ciphers -- RSA ciphers -- ElGamal ciphers -- The advanced encryption standard -- Message authentication.</div>

Classical and Contemporary Cryptology
✍ Richard J. Spillman πŸ“‚ Library πŸ“… 2004 πŸ› Prentice Hall 🌐 English

"This is a well-written textbook, one destined to become an undergraduate favorite in the fascinating and rewarding study of cryptology." &#151; Atul Prakash, University of Michigan "Dr. Spillman's Cryptographic Analysis Program, (CAP), is not only a fantastic teaching tool, it's very useful to the