000 02879cam a2200289 a 4500
008 080324s2007 njua b 001 0 eng
010 _a2006049338
020 _a9780471947837
035 _a(Sirsi) u291
040 _aEG-CaNU
_cEG-CaNU
_dEG-CaNU
042 _ancode
082 0 0 _a005.8
_2 22
100 1 _aKonheim, Alan G.,
_d 1934-
_95462
245 1 0 _aComputer security and cryptography /
_c Alan G. Konheim.
260 _aHoboken, N.J. :
_b Wiley-Interscience,
_c c2007.
300 _axvii, 521 p. :
_b ill. ;
_c 27 cm.
504 _aIncludes bibliographical references and index.
505 0 _aaperitifs -- columnar transposition -- monoalphabetic substitution -- polyalphabetic substitution -- statistical tests -- the emergence of cipher machines -- the japanese cipher machines -- stream ciphers -- block-ciphers: lucifer, des, and aes -- the paradigm of public key cryptography -- the knapsack cryptosystem -- the rsa cryptosystem -- prime numbers and factorization -- the discrete logarithm problem -- elliptic curve cryptography -- key exchange in a network -- digital signatures and authentication -- applications of cryptography -- cryptographic patents.
520 _aGain the skills and knowledge needed to create effective data security systems This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems. The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work. Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications
630 0 0 _aCIT.
_914
650 0 _aComputer security.
_95463
650 0 _aCryptography.
_9378
596 _a1
999 _c1939
_d1939