Cryptography Demystified
John Hershey
- 出版商: McGraw-Hill Education
- 出版日期: 2002-09-13
- 售價: $2,210
- 貴賓價: 9.5 折 $2,100
- 語言: 英文
- 頁數: 356
- 裝訂: Paperback
- ISBN: 0071406387
- ISBN-13: 9780071406383
-
相關分類:
資訊安全
海外代購書籍(需單獨結帳)
買這商品的人也買了...
-
$882Digital Systems Design Using VHDL
-
$400$316 -
$650$553 -
$490$417 -
$780$624 -
$1,860$1,767 -
$199$179 -
$380$342 -
$690$587 -
$490$382 -
$490$382 -
$945Head First EJB: Passing the Sun Certified Business Component Developer Exam
-
$720$569 -
$650$553 -
$650$553 -
$590$531 -
$650$553 -
$1,650$1,568 -
$620$558 -
$420$328 -
$650$553 -
$860$731 -
$560$442 -
$450$383 -
$650$553
相關主題
商品描述
Cryptography is not just for specialists. Now every wireless message,
wireless phone call, online transaction, and email is encrypted at one end and
decrypted at the other. “Crypto” is part of the job description for network
designers, network engineers, and telecom developers. If you need cryptography
basics—but dread the thick tomes that are your only other option—help is at
hand. Cryptography Demystified puts the fundamentals into a 35-module,
learn-by-doing package that’s actually fun to use.
You must read this book if—
* You prefer your
simplifications from an expert who understands the complexities
* 6
years of success as a short course for students and professionals works for
you
* you enjoy hearing the phrase “nothing to memorize”
*
ecommerce, email, network security, or wireless communications is part of your
bailiwick
* cracking cryptography means a jump up the career
ladder
* the words “public-key cryptography,” “channel-based
cryptography,” and “prime numbers” pique your interest
* best-practices
cryptography is the only secure way for you—and your company—to go
One of the most complex subjects in Information Technology, cryptography
gets its due in this down-to-earth, self-teaching tutorial—the first to make the
basics of the science truly accessible.
Contents
Part I: INTRODUCTION TO SYMMETRIC
CRYPTOGRAPHY
Module 1 First
Considerations
Exercise 1
Module 2 Plaintext
Exercise
2
Module 3 Digitization of
Plaintext
Exercise 3
Module
4 Toward a Cryptographic Paradigm
Exercise
4
Module 5 What We Want from the
Keytext
Exercise 5
Module 6
Randomness I
Exercise 6
Module 7 Finite State Sequential Machines
Exercise
7 Transition Matrix
Module 8
m-sequences
Exercise 8
Module 9 The Paradigm Attempted
Exercise
9
Module 10 The Block Cipher Function - A Modern
Keystone
to the Paradigm
Exercise
10
Module 11 Confidentiality Modes: ECB and
CTR
Exercise 11
Module 12
Confidentiality Mode: Output Feedback (OFB)
Exercise 12
Module 13 Confidentiality Modes: Cipher
Feedback (CFB)
and Cipher Block Chaining (CBC)
Exercise 13
Part II NUMBER THEORY WE WILL
NEED
Module 14 Prime Numbers
I
Exercise 14
Module 15
Congruences
Exercise 15
Module 16 Euler-Fermat Theorem
Exercise
16
Module 17 The Euler Phi (f)
Function
Exercise 17
Module
18 The Binary Exponentiation Algorithm
Exercise
18
Module 19 The Extended Euclidean
Algorithm
Exercise 19
Module
20 Primitive Roots
Exercise
20
Module 21 Chinese Remainder
Theorem
Exercise 21
Part III
INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY
Module 22
Merkles Puzzle
Exercise 22
Module 23 The Diffie-Hellman Public Key Cryptographic
System
Exercise 23
Module 24
Split Search
Exercise 24
Module 25 A Variant of the Diffie-Hellman System
Exercise 25
Module 26 The RSA Public Key Cryptographic
System
Exercise 26
Module 27
Prime Numbers II
Exercise 27
Part
IV KEYING VARIABLES
Module 28 Keying Variable
Distribution
Exercise 28
Module 29 Secret Sharing
Exercise
29
Module 30 Randomness II
Exercise 30
Module 31
Cryptovariables
Exercise 31
Part V
CRYPTO-OBSOLESCENCE
Module 32 The Aging
Cryptoalgorithm
Exercise 32
Module 33 SUPERDES(tm
商品描述(中文翻譯)
一種非傳統、有趣的方式來掌握密碼學的基礎
密碼學不僅僅是專家的專利。現在每一條無線訊息、無線電話通話、線上交易和電子郵件在一端都是加密的,在另一端則是解密的。「Crypto」已成為網路設計師、網路工程師和電信開發者的工作描述的一部分。如果你需要密碼學的基礎知識,但又害怕那些厚重的專業書籍,這本書將是你的幫助。《Cryptography Demystified》將基礎知識整理成35個模組的實作學習包,實際上使用起來非常有趣。
你必須閱讀這本書如果—
* 你希望從了解複雜性的專家那裡獲得簡化的知識
* 6年的成功經驗作為學生和專業人士的短期課程適合你
* 你喜歡聽到「無需記憶」這個短語
* 電子商務、電子郵件、網路安全或無線通訊是你的專業領域
* 破解密碼學意味著職業生涯的提升
* 「公鑰密碼學」、「基於通道的密碼學」和「質數」這些詞引起了你的興趣
* 最佳實踐的密碼學是你和你的公司唯一安全的選擇
作為資訊科技中最複雜的主題之一,密碼學在這本實用的自學教程中得到了應有的重視——這是第一本使這門科學的基礎知識真正可及的書籍。
目錄
第一部分:對稱密碼學的介紹
模組 1 首要考量
練習 1
模組 2 明文
練習 2
模組 3 明文的數位化
練習 3
模組 4 朝向密碼學範式
練習 4
模組 5 我們對密鑰文本的期望
練習 5
模組 6 隨機性 I
練習 6
模組 7 有限狀態序列機
練習 7 轉移矩陣
模組 8 m-序列
練習 8
模組 9 嘗試的範式
練習 9
模組 10 區塊密碼函數 - 現代範式的基石
練習 10
模組 11 機密性模式:ECB 和 CTR
練習 11
模組 12 機密性模式:輸出反饋 (OFB)
練習 12
模組 13 機密性模式:密碼反饋 (CFB) 和 密碼區塊鏈 (CBC)
練習 13
第二部分:我們需要的數論
模組 14 質數 I
練習 14
模組 15 同餘
練習 15
模組 16 歐拉-費馬定理
練習 16
模組 17 歐拉 φ (f) 函數
練習 17
模組 18 二進位指數演算法
練習 18
模組 19 擴展歐幾里得演算法
練習 19
模組 20 原根
練習 20
模組 21 中國剩餘定理