Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

Available items only
Author Elbirt, Adam J.

Title Understanding and applying cryptography and data security / Adam J. Elbirt.

Imprint Boca Raton, Fla. : CRC Press, 2009.


Location Call No. OPAC Message Status
 Axe Books 24x7 IT E-Book  Electronic Book    ---  Available
Description 1 online resource
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Bibliography Includes bibliographical references and index.
Contents Front cover -- Dedication -- Contents -- List of Figures -- List of Tables -- About the Author -- Acknowledgments -- Chapter 1. Introduction -- Chapter 2. Symmetric-Key Cryptography -- Chapter 3. Symmetric-Key Cryptography: Substitution Ciphers -- Chapter 4. Symmetric-Key Cryptography: Stream Ciphers -- Chapter 5. Symmetric-Key Cryptography: Block Ciphers -- Chapter 6. Public-Key Cryphotgraphy -- Chapter 7. Public-Key Cryphography: RSA -- Chapter 8. Public-Key Cryptography: Discrete Logarithms -- Chapter 9. Public-Key Cryptograhy: Elliptic Curves -- Chapter 10. Cryptographic Components -- Chapter 11. Cryptographic Protocols -- References -- Index -- Back cover.
Summary Introduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advanced Encryption StandardPublic-Key Cryptography Issues with Symmetric-Key Cryptosystems Public-Key Cryptosystem Overview One-Way Functions The Euclidean AlgorithmThe Extended Euclidean Algorithm Euler's Phi FunctionEuler's Theorem Fermat's Little Theorem Homework ProblemsPublic-Key Cryptography: RSACryptosystem Efficient ImplementationAttacks Homework ProblemsPublic-Key Cryptography: Discrete Logarithms Cyclic Groups The Discrete Logarithm Problem Diffie-Hellman Key Agreement Protocol Efficient Implementation ElGamal Encryption AttacksHomework ProblemsPublic-Key Cryptography: Elliptic Curves Cryptosystem Diffie-Hellman Key Agreement Protocol Efficient Implementation Menezes-Vanstone Encryption Attacks Homework ProblemsCryptographic Components Digital SignaturesHash FunctionsMessage Authentication CodesCryptographic Protocols Security Services Key EstablishmentApplicationsHomework ProblemsReferencesIndex.
Subject Computer security.
Computer security. (OCoLC)fst00872484
Cryptography. (OCoLC)fst00884552
Genre/Form Electronic books.
ISBN 9781420061604 (alk. paper)
Standard No. AU@ 000053259508

Available items only