𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Information Security (Principles and Practice) || Appendix: A-2 Math Essentials

✍ Scribed by Stamp, Mark


Publisher
John Wiley & Sons, Inc.
Year
2011
Tongue
English
Weight
782 KB
Edition
2
Category
Article
ISBN
0470626399

No coin nor oath required. For personal study only.

✦ Synopsis


ARP cache ARP cache

Figure A-6: ARP Cache Poisoning A-1.7 C o n c l u s i o n s

In this section, we've barely scratched the surface of the vast topic that is networking. Tanenbaum [298] presents a good introduction to a wide range of networking topics, and his book is well suited to independent study. Another good introductory textbook on networking is Kurose and Ross [177]. A more detailed discussion of networking protocols can be found in [113]. If more details are needed than what is available in [113], consult the appropriate RFCs.

A-2 M a t h Essentials 7/5ths of all people don't understand fractions.

-Anonymous

This section contains a brief overview of the math topics that are relevant to understanding the material presented in this book. First, we cover some modular arithmetic basics. Modular arithmetic figures prominently in the field of public key cryptography. We then discuss a few very basic facts about permutations. Permutations are a fundamental building block of ciphersfrom classic ciphers to modern block ciphers. Next, we consider a few concepts from discrete probability and, finally, we provide a quick introduction to linear algebra. Chapter 6 contains the details of the lattice-reduction attack on the knapsack cryptosystem, and that's the only place where linear algebra is used in this book.