000 02092cam a22002054a 4500
999 _c12160
_d12160
001 15340204
005 20200825110407.0
008 080623s2009 fluaa b 001 0 eng
020 _a9781420061604 (alk. paper)
040 _cDLC
082 0 0 _a005.8
_222
_bE374
100 1 _aElbirt, Adam J.
245 1 0 _aUnderstanding and applying cryptography and data security
_c/ Adam J. Elbirt.
260 _aBoca Raton, Fl :
_bCRC Press,
_c2009
300 _axxvii, 637 p. :
_bill. ;
_c25 cm.
650 0 _aComputer security.
650 0 _aCryptography.
942 _cBK
505 0 _aIntroduction A Brief History of Cryptography and Data Security Cryptography and Data Security in the Modern World Existing Texts Book Organization Symmetric-Key Cryptography Cryptosystem Overview The Modulo Operator Greatest Common Divisor The Ring ZmHomework ProblemsSymmetric-Key Cryptography: Substitution Ciphers Basic Cryptanalysis Shift Ciphers Affine Ciphers Homework ProblemsSymmetric-Key Cryptography: Stream Ciphers Random Numbers The One-Time Pad Key Stream GeneratorsReal-World ApplicationsHomework ProblemsSymmetric-Key Cryptography: Block Ciphers The Data Encryption StandardThe Advanced Encryption StandardPublic-Key Cryptography Issues with Symmetric-Key Cryptosystems Public-Key Cryptosystem Overview One-Way Functions The Euclidean AlgorithmThe Extended Euclidean Algorithm Euler's Phi FunctionEuler's Theorem Fermat's Little Theorem Homework ProblemsPublic-Key Cryptography: RSACryptosystem Efficient ImplementationAttacks Homework ProblemsPublic-Key Cryptography: Discrete Logarithms Cyclic Groups The Discrete Logarithm Problem Diffie-Hellman Key Agreement Protocol Efficient Implementation ElGamal Encryption AttacksHomework ProblemsPublic-Key Cryptography: Elliptic Curves Cryptosystem Diffie-Hellman Key Agreement Protocol Efficient Implementation Menezes-Vanstone Encryption Attacks Homework ProblemsCryptographic Components Digital SignaturesHash FunctionsMessage Authentication CodesCryptographic Protocols Security Services Key EstablishmentApplicationsHomework ProblemsReferencesIndex