Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Books/E-Docs
Author Elbirt, Adam J.

Title Understanding and applying cryptography and data security / Adam J. Elbirt.

Imprint Boca Raton, Fla. : CRC Press, 2009.

Copies

Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Bibliography Includes bibliographical references and index.
Contents Front cover -- Dedication -- Contents -- List of Figures -- List of Tables -- About the Author -- Acknowledgments -- Chapter 1. Introduction -- Chapter 2. Symmetric-Key Cryptography -- Chapter 3. Symmetric-Key Cryptography: Substitution Ciphers -- Chapter 4. Symmetric-Key Cryptography: Stream Ciphers -- Chapter 5. Symmetric-Key Cryptography: Block Ciphers -- Chapter 6. Public-Key Cryphotgraphy -- Chapter 7. Public-Key Cryphography: RSA -- Chapter 8. Public-Key Cryptography: Discrete Logarithms -- Chapter 9. Public-Key Cryptograhy: Elliptic Curves -- Chapter 10. Cryptographic Components -- Chapter 11. Cryptographic Protocols -- References -- Index -- Back cover.
Summary Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advanced Encryption StandardPublic-Key Cryptography Issues with Symmetric-Key Cryptosystems Public-Key Cryptosystem Overview One-Way Functions The Euclidean AlgorithmThe Extended Euclidean Algorithm Euler's Phi FunctionEuler's Theorem Fermat's Little Theorem Homework ProblemsPublic-Key Cryptography: RSACryptosystem Efficient ImplementationAttacks Homework ProblemsPublic-Key Cryptography: Discrete Logarithms Cyclic Groups The Discrete Logarithm Problem Diffie-Hellman Key Agreement Protocol Efficient Implementation ElGamal Encryption AttacksHomework ProblemsPublic-Key Cryptography: Elliptic Curves Cryptosystem Diffie-Hellman Key Agreement Protocol Efficient Implementation Menezes-Vanstone Encryption Attacks Homework ProblemsCryptographic Components Digital SignaturesHash FunctionsMessage Authentication CodesCryptographic Protocols Security Services Key EstablishmentApplicationsHomework ProblemsReferencesIndex.
Subject Computer security.
Cryptography.
Computer security. (OCoLC)fst00872484
Cryptography. (OCoLC)fst00884552
Genre/Form Electronic books.
ISBN 9781420061604 (alk. paper)
Standard No. AU@ 000053259508

 
    
Available items only