Amazon cover image
Image from Amazon.com

Cryptology : classical and modern / Richard Klima and Neil P. Sigmon.

By: Contributor(s): Series: Chapman & Hall/CRC cryptography and network security seriesPublisher: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2019]Edition: 2nd editionDescription: xiii, 482 pages : illustrations ; 25 cmISBN:
  • 9781138047624 (hardback)
Subject(s): DDC classification:
  • 005.824 23 KLI
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library 005.824 KLI (Browse shelf(Opens below)) 1 Available BUML24010351


CONTENTS

1. Introduction
Basic Terminology
Cryptology in Practice
Why study Cryptology

2. Substitution Ciphers
Key word Substitution Ciphers
Cryptanalysis of substitution Ciphers
Exercises

3. Transposition Ciphers
Colomnar Transposition Ciphers
Cryptanalysis of Transposition Ciphers
ADFGX and ADFGVX Ciphers

4. The Enigma Machine
The Enigma Cipher Machine
Combinatorics
Security of the Enigma machine

5. Turing Bombe
Cribs and Menus
Loops and Logical Inconsistencies
Searching for the correct configuration
The Diagonal Board
The checking Machine
etc

6. Shift and Affine Ciphers
Modular Arithmetic
Shift Ciphers
Crytanalysis of shift Ciphers
Affine Ciphers
Crytanalysis of Affine Ciphers

7. Alberti and Vigenere Ciphers
Alberti Ciphers
Vigenere Ciphers
Probability
The Friedman Test
The Kasiski Test
etc

8. Hill Ciphers
Matrices
Hill Ciphers
Crytanalysis of Hill Ciphers

9. RSA Ciphers
Introduction to public-Key Cipher
Introduction to RSA Ciphers
The Euclidean Algorithm
Modular Exponentiation
AsCII
RSA Ciphers
etc

10. EIGamal Ciphers
The Diffie-Hellman Key Exchange
Discrete Logarithm
EIGamal Ciphers
Cryptanalysis of EIGamal Ciphers

11. The Advanced Encryption Standard
Representations of Numbers
Stream Cipher
AES Preliminaries
AES Encryption
AES Decryption
AES Security

12. Message Authentication
RSA Signatures
Hash Functions
RSA Signatures with Hashing
The man-in the middle-Attack
Public-Key Infrastructures
















Includes bibliographical references and index p. 469-482

There are no comments on this title.

to post a comment.