<span>This expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography
Modern Cryptography: Applied Mathematics for Encryption and Information Security
β Scribed by Chuck Easttom
- Publisher
- McGraw-Hill Education
- Year
- 2015
- Tongue
- English
- Leaves
- 416
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
A Practical Guide to Cryptography Principles and Security Practices
Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in todayβs data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors.
- Learn the necessary number theory, discrete math, and algebra
- Employ symmetric ciphers, including Feistel and substitution-permutation ciphers
- Understand asymmetric cryptography algorithms
- Design s-boxes that maximize output non-linearity
- Deploy cryptographic hashes
- Create cryptographic keys using pseudo random number generators
- Encrypt Web traffic using SSL/TLS
- Secure VPN, WiFi, and SSH communications
- Work with cryptanalysis and steganography
- Explore government, military, and intelligence agency applications
π SIMILAR VOLUMES
In todays information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cy