Understanding cryptography: a textbook for students and practitioners
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Ausgabe: | 2. corr. printing |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Klappentext |
Beschreibung: | Literaturverz. S. 359 - 366 |
Beschreibung: | XVIII, 372 S. Ill., graph. Darst. |
ISBN: | 9783642041006 9783642446498 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039865382 | ||
003 | DE-604 | ||
005 | 20161207 | ||
007 | t | ||
008 | 120203s2010 gw ad|| |||| 00||| eng d | ||
015 | |a 09,N38,0042 |2 dnb | ||
015 | |a 10,A03 |2 dnb | ||
020 | |a 9783642041006 |c Pp : EUR 37.40 (freier Pr.), ca. sfr 85.50 (freier Pr.) |9 978-3-642-04100-6 | ||
020 | |a 9783642446498 |9 978-3-642-44649-8 | ||
024 | 3 | |a 9783642041006 | |
028 | 5 | 2 | |a 12211364 |
035 | |a (OCoLC)780108430 | ||
035 | |a (DE-599)BVBBV039865382 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-355 |a DE-739 |a DE-634 |a DE-91 |a DE-Aug4 |a DE-1050 |a DE-703 | ||
082 | 0 | |a 005.82 |2 22/ger | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Paar, Christof |d 1963- |e Verfasser |0 (DE-588)1032727705 |4 aut | |
245 | 1 | 0 | |a Understanding cryptography |b a textbook for students and practitioners |c Christof Paar ; Jan Pelzl |
250 | |a 2. corr. printing | ||
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XVIII, 372 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverz. S. 359 - 366 | ||
650 | 0 | 7 | |a Internet |0 (DE-588)4308416-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datensicherung |0 (DE-588)4011144-1 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Internet |0 (DE-588)4308416-3 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 2 | |a Datensicherung |0 (DE-588)4011144-1 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 1 | 1 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
700 | 1 | |a Pelzl, Jan |d 1975- |e Verfasser |0 (DE-588)132800780 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-04101-3 |
856 | 4 | 2 | |m Digitalisierung UB Passau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
999 | |a oai:aleph.bib-bvb.de:BVB01-024724846 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804148804907171840 |
---|---|
adam_text | Table
of
Contents
Introduction to Cryptography and Data Security
.................. 1
1.1
Overview of Cryptology (and This Book)
...................... 2
1.2
Symmetric Cryptography
.................................... 4
1.2.1
Basics
.............................................. 4
1.2.2
Simple Symmetric Encryption: The Substitution Cipher
.... 6
1.3
Cryptanalysis
.............................................. 9
1.3.1
General Thoughts on Breaking Cryptosystems
............ 9
1.3.2
How Many Key Bits Are Enough?
...................... 11
1.4
Modular Arithmetic and More Historical Ciphers
................ 13
1.4.1
Modular Arithmetic
.................................. 13
1.4.2
Integer Rings
........................................ 16
1.4.3
Shift Cipher (or Caesar Cipher)
........................ 18
1.4.4
Affine
Cipher
....................................... 19
1.5
Discussion and Further Reading
.............................. 20
1.6
Lessons Learned
........................................... 22
Problems
...................................................... 24
Stream Ciphers
................................................ 29
2.1
Introduction
............................................... 30
2.1.1
Stream Ciphers vs. Block Ciphers
...................... 30
2.1.2
Encryption and Decryption with Stream Ciphers
.......... 31
2.2
Random Numbers and an Unbreakable Stream Cipher
............ 34
2.2.1
Random Number Generators
........................... 34
2.2.2
The One-Time Pad
................................... 36
2.2.3
Towards Practical Stream Ciphers
...................... 38
2.3
Shift Register-Based Stream Ciphers
.......................... 41
2.3.1
Linear Feedback Shift Registers (LFSR)
................. 41
2.3.2
Known-Plaintext Attack Against Single LFSRs
........... 45
2.3.3
Trivium
............................................ 46
2.4
Discussion and Further Reading
.............................. 49
2.5
Lessons Learned
........................................... 50
Problems...................................................... 52
The Data Encryption
Standard (DES) and Alternatives............. 55
3.1
Introduction to
DES ........................................ 56
3.1.1
Confusion
and Diffusion.............................. 57
3.2
Overview of the
DES
Algorithm
.............................. 58
3.3
Internal Structure of
DES.................................... 61
3.3.1
Initial and Final Permutation
........................... 61
3.3.2
The /-Function
...................................... 62
3.3.3
Key Schedule
....................................... 67
3.4
Decryption
................................................ 69
3.5
Security of
DES............................................ 72
3.5.1
Exhaustive Key Search
............................... 73
3.5.2
Analytical Attacks
................................... 75
3.6
Implementation in Software and Hardware
..................... 75
3.7 DES
Alternatives
........................................... 77
3.7.1
The Advanced Encryption Standard (AES) and the AES
Finalist Ciphers
...................................... 77
3.7.2
Triple
DES (3DES)
and DESX
......................... 78
3.7.3
Lightweight Cipher PRESENT
......................... 78
3.8
Discussion and Further Reading
.............................. 81
3.9
Lessons Learned
........................................... 82
Problems
...................................................... 83
The Advanced Encryption Standard (AES)
....................... 87
4.1
Introduction
............................................... 88
4.2
Overview of the AES Algorithm
.............................. 89
4.3
Some Mathematics: A Brief Introduction to Galois Fields
......... 90
4.3.1
Existence of Finite Fields
............................. 90
4.3.2
Prime Fields
........................................ 93
4.3.3
Extension Fields GF(2m)
............................. 94
4.3.4
Addition and Subtraction in GF(2m)
.................... 95
4.3.5
Multiplication in GF{2m)
............................. 96
4.3.6
Inversion in GF{2m)
.................................. 98
4.4
Internal Structure of AES
.................................... 99
4.4.1
Byte Substitution Layer
...............................101
4.4.2
Diffusion Layer
......................................103
4.4.3
Key Addition Layer
..................................106
4.4.4
Key Schedule
.......................................106
4.5
Decryption
................................................110
4.6
Implementation in Software and Hardware
.....................115
4.7
Discussion and Further Reading
..............................116
4.8
Lessons Learned
...........................................117
Problems
......................................................118
More About Block Ciphers
......................................123
5.1
Encryption with Block Ciphers: Modes of Operation
.............124
5.1.1
Electronic
Codebook
Mode (ECB)
......................124
5.1.2
Cipher Block Chaining Mode (CBC)
....................128
5.1.3
Output Feedback Mode (OFB)
.........................130
5.1.4
Cipher Feedback Mode (CFB)
.........................131
5.1.5
Counter Mode (CTR)
.................................132
5.1.6
Galois Counter Mode (GCM)
..........................134
5.2
Exhaustive Key Search Revisited
.............................136
5.3
Increasing the Security of Block Ciphers
.......................137
5.3.1
Double Encryption and Meet-in-the-Middle Attack
........138
5.3.2
Triple Encryption
....................................140
5.3.3
Key Whitening
......................................141
5.4
Discussion and Further Reading
..............................143
5.5
Lessons Learned
...........................................144
Problems
......................................................145
Introduction to Public-Key Cryptography
........................149
6.1
Symmetric vs. Asymmetric Cryptography
......................150
6.2
Practical Aspects of Public-Key Cryptography
..................153
6.2.1
Security Mechanisms
.................................154
6.2.2
The Remaining Problem: Authenticity of Public Keys
.....154
6.2.3
Important Public-Key Algorithms
......................155
6.2.4
Key Lengths and Security Levels
.......................156
6.3
Essential Number Theory for Public-Key Algorithms
............157
6.3.1
Euclidean Algorithm
.................................157
6.3.2
Extended Euclidean Algorithm
.........................160
6.3.3
Euler s Phi Function
..................................164
6.3.4
Fermat s Little Theorem and Euler s Theorem
............166
6.4
Discussion and Further Reading
..............................168
6.5
Lessons Learned
...........................................169
Problems
......................................................170
The RSA Cryptosystem
.........................................173
7.1
Introduction
...............................................174
7.2
Encryption and Decryption
..................................174
7.3
Key Generation and Proof of Correctness
......................175
7.4
Encryption and Decryption: Fast Exponentiation
................179
7.5
Speed-up Techniques for RSA
................................183
7.5.1
Fast Encryption with Short Public Exponents
.............183
7.5.2
Fast Decryption with the Chinese Remainder Theorem
.....184
7.6
Finding Large Primes
.......................................187
7.6.1
How Common Are Primes?
............................187
7.6.2
Primality Tests
......................................188
7.7
RSA in Practice: Padding
....................................192
7.8
Attacks
...................................................194
7.9
Implementation in Software and Hardware
.....................197
7.10
Discussion and Further Reading
..............................198
7.11
Lessons Learned
...........................................199
Problems
......................................................200
8
Public-Key Cryptosystems Based on the Discrete Logarithm Problem
205
8.1
Diffie-Hellman Key Exchange
...............................206
8.2
Some Algebra
.............................................208
8.2.1
Groups
.............................................208
8.2.2
Cyclic Groups
.......................................210
8.2.3
Subgroups
..........................................214
8.3
The Discrete Logarithm Problem
.............................216
8.3.1
The Discrete Logarithm Problem in Prime Fields
..........216
8.3.2
The Generalized Discrete Logarithm Problem
............218
8.3.3
Attacks Against the Discrete Logarithm Problem
..........219
8.4
Security of the Diffie-Hellman Key Exchange
..................225
8.5
The Elgamal Encryption Scheme
.............................226
8.5.1
From Diffie-Hellman Key Exchange to Elgamal Encryption
226
8.5.2
The Elgamal Protocol
................................227
8.5.3
Computational Aspects
...............................229
8.5.4
Security
............................................230
8.6
Discussion and Further Reading
..............................232
8.7
Lessons Learned
...........................................233
Problems
......................................................234
9
Elliptic Curve Cryptosystems
....................................239
9.1
How to Compute with Elliptic Curves
.........................240
9.1.1
Definition of Elliptic Curves
...........................241
9.1.2
Group Operations on Elliptic Curves
....................242
9.2
Building a Discrete Logarithm Problem with Elliptic Curves
......246
9.3
Diffie-Hellman Key Exchange with Elliptic Curves
..............249
9.4
Security
..................................................251
9.5
Implementation in Software and Hardware
.....................252
9.6
Discussion and Further Reading
..............................253
9.7
Lessons Learned
...........................................255
Problems
......................................................256
10
Digital Signatures
..............................................259
10.1
Introduction
...............................................260
10.1.1
Odd Colors for Cars, or: Why Symmetric Cryptography Is
Not Sufficient
.......................................260
10.1.2
Principles of Digital Signatures
........................261
10.1.3
Security Services
....................................263
10.2
The RSA Signature Scheme
..................................264
10.2.1 Schoolbook
RSA
Digital
Signature
.....................265
10.2.2
Computational Aspects
...............................267
10.2.3
Security
............................................267
10.3
The Elgamal Digital Signature Scheme
........................270
10.3.1 Schoolbook
Elgamal Digital Signature
..................270
10.3.2
Computational Aspects
...............................273
10.3.3
Security
............................................274
10.4
The Digital Signature Algorithm (DSA)
........................277
10.4.1
The DSA Algorithm
..................................277
10.4.2
Computational Aspects
...............................280
10.4.3
Security
............................................281
10.5
The Elliptic Curve Digital Signature Algorithm (ECDSA)
........282
10.5.1
The ECDSA Algorithm
...............................282
10.5.2
Computational Aspects
...............................285
10.5.3
Security
............................................286
10.6
Discussion and Further Reading
..............................287
10.7
Lessons Learned
...........................................288
Problems
......................................................289
11
Hash Functions
................................................293
11.1
Motivation: Signing Long Messages
...........................294
11.2
Security Requirements of Hash Functions
......................296
11.2.1
Preimage Resistance or One-Wayness
...................297
11.2.2
Second Preimage Resistance or Weak Collision Resistance
. 297
11.2.3
Collision Resistance and the Birthday Attack
.............299
11.3
Overview of Hash Algorithms
................................303
11.3.1
Dedicated Hash Functions: The MD4 Family
.............304
11.3.2
Hash Functions from Block Ciphers
....................305
11.4
The Secure Hash Algorithm SHA-1
...........................307
11.4.1
Preprocessing
.......................................308
11.4.2
Hash Computation
...................................309
11.4.3
Implementation
......................................312
11.5
Discussion and Further Reading
..............................312
11.6
Lessons Learned
...........................................313
Problems
......................................................315
12
Message Authentication Codes (MACs)
...........................319
12.1
Principles of Message Authentication Codes
....................320
12.2
MACs from Hash Functions: HMAC
..........................321
12.3
MACs from Block Ciphers: CBC-MAC
........................325
12.4
Galois Counter Message Authentication Code (GMAC)
..........326
12.5
Discussion and Further Reading
..............................327
12.6
Lessons Learned
...........................................328
Problems
......................................................329
xviii
Table
of
Contents
13
Key Establishment
.............................................331
13.1
Introduction
...............................................332
13.1.1
Some Terminology
...................................332
13.1.2
Key Freshness and Key Derivation
......................332
13.1.3
The n2 Key Distribution Problem
.......................334
13.2
Key Establishment Using Symmetric-Key Techniques
............336
13.2.1
Key Establishment with a Key Distribution Center
........336
13.2.2 Kerberos ...........................................339
13.2.3
Remaining Problems with Symmetric-Key Distribution
....341
13.3
Key Establishment Using Asymmetric Techniques
...............342
13.3.1
Man-in-the-Middle Attack
.............................342
13.3.2
Certificates
.........................................344
13.3.3
Public-Key Infrastructures (PKI) and CAs
...............347
13.4
Discussion and Further Reading
..............................350
13.5
Lessons Learned
...........................................352
Problems
......................................................353
References
.........................................................359
Index
.............................................................367
Understanding Cryptography
Cryptography is now ubiquitous
--
moving beyond the traditional environments, such as government
communications and banking systems, we see cryptographic techniques realized in Web browsers,
e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and
even medical implants. Today s designers need a comprehensive understanding of applied
cryptography.
After an introduction to cryptography and data security, the authors explain the main techniques in
modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard
(DES)
and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key
cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital
signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment,
including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on
communicating the essentials and keeping the mathematics to a minimum, and they move quickly
from explaining the foundations to describing practical implementations, including recent topics such
as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.
The authors have considerable experience teaching applied cryptography to engineering and computer
science students and to professionals, and they make extensive use of examples,, problems, and chapter
reviews, while the book s website offers slides, projects and links to further resources. This is a suitable
textbook for graduate and advanced undergraduate courses and also for self-study by engineers.
|
any_adam_object | 1 |
author | Paar, Christof 1963- Pelzl, Jan 1975- |
author_GND | (DE-588)1032727705 (DE-588)132800780 |
author_facet | Paar, Christof 1963- Pelzl, Jan 1975- |
author_role | aut aut |
author_sort | Paar, Christof 1963- |
author_variant | c p cp j p jp |
building | Verbundindex |
bvnumber | BV039865382 |
classification_rvk | SK 170 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)780108430 (DE-599)BVBBV039865382 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | 2. corr. printing |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02798nam a2200625 c 4500</leader><controlfield tag="001">BV039865382</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20161207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120203s2010 gw ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09,N38,0042</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,A03</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642041006</subfield><subfield code="c">Pp : EUR 37.40 (freier Pr.), ca. sfr 85.50 (freier Pr.)</subfield><subfield code="9">978-3-642-04100-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642446498</subfield><subfield code="9">978-3-642-44649-8</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642041006</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12211364</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)780108430</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039865382</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Paar, Christof</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1032727705</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Understanding cryptography</subfield><subfield code="b">a textbook for students and practitioners</subfield><subfield code="c">Christof Paar ; Jan Pelzl</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. corr. printing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XVIII, 372 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverz. S. 359 - 366</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internet</subfield><subfield code="0">(DE-588)4308416-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datensicherung</subfield><subfield code="0">(DE-588)4011144-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pelzl, Jan</subfield><subfield code="d">1975-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132800780</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-04101-3</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024724846</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV039865382 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:12:58Z |
institution | BVB |
isbn | 9783642041006 9783642446498 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024724846 |
oclc_num | 780108430 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-739 DE-634 DE-91 DE-BY-TUM DE-Aug4 DE-1050 DE-703 |
owner_facet | DE-355 DE-BY-UBR DE-739 DE-634 DE-91 DE-BY-TUM DE-Aug4 DE-1050 DE-703 |
physical | XVIII, 372 S. Ill., graph. Darst. |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
spelling | Paar, Christof 1963- Verfasser (DE-588)1032727705 aut Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl 2. corr. printing Berlin [u.a.] Springer 2010 XVIII, 372 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Literaturverz. S. 359 - 366 Internet (DE-588)4308416-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Datensicherung (DE-588)4011144-1 gnd rswk-swf (DE-588)4123623-3 Lehrbuch gnd-content Internet (DE-588)4308416-3 s Kryptologie (DE-588)4033329-2 s Datensicherung (DE-588)4011144-1 s 1\p DE-604 Kryptosystem (DE-588)4209132-9 s 2\p DE-604 Pelzl, Jan 1975- Verfasser (DE-588)132800780 aut Erscheint auch als Online-Ausgabe 978-3-642-04101-3 Digitalisierung UB Passau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Paar, Christof 1963- Pelzl, Jan 1975- Understanding cryptography a textbook for students and practitioners Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd |
subject_GND | (DE-588)4308416-3 (DE-588)4033329-2 (DE-588)4209132-9 (DE-588)4011144-1 (DE-588)4123623-3 |
title | Understanding cryptography a textbook for students and practitioners |
title_auth | Understanding cryptography a textbook for students and practitioners |
title_exact_search | Understanding cryptography a textbook for students and practitioners |
title_full | Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl |
title_fullStr | Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl |
title_full_unstemmed | Understanding cryptography a textbook for students and practitioners Christof Paar ; Jan Pelzl |
title_short | Understanding cryptography |
title_sort | understanding cryptography a textbook for students and practitioners |
title_sub | a textbook for students and practitioners |
topic | Internet (DE-588)4308416-3 gnd Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd Datensicherung (DE-588)4011144-1 gnd |
topic_facet | Internet Kryptologie Kryptosystem Datensicherung Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024724846&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT paarchristof understandingcryptographyatextbookforstudentsandpractitioners AT pelzljan understandingcryptographyatextbookforstudentsandpractitioners |