Cryptology: classical and modern
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton ; London ; New York
Taylor & Francis
[2019]
|
Ausgabe: | second edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xiii, 482 Seiten Illustrationen, Diagramme |
ISBN: | 9781138047624 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045504963 | ||
003 | DE-604 | ||
005 | 20200211 | ||
007 | t | ||
008 | 190311s2019 xxua||| |||| 00||| eng d | ||
010 | |a 018028365 | ||
020 | |a 9781138047624 |c hbk. |9 978-1-138-04762-4 | ||
035 | |a (OCoLC)1098188222 | ||
035 | |a (DE-599)BVBBV045504963 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-739 |a DE-11 | ||
050 | 0 | |a TK5102.94 | |
082 | 0 | |a 005.8/24 |2 23 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Klima, Richard E. |d 1970- |e Verfasser |0 (DE-588)135945402 |4 aut | |
245 | 1 | 0 | |a Cryptology |b classical and modern |c Richard Klima, Neil P. Sigmon |
250 | |a second edition | ||
264 | 1 | |a Boca Raton ; London ; New York |b Taylor & Francis |c [2019] | |
264 | 4 | |c © 2019 | |
300 | |a xiii, 482 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Cryptography | |
650 | 4 | |a Cryptography |x Data processing | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Ciphers | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Sigmon, Neil P. |e Verfasser |0 (DE-588)104364380X |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030889582&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030889582 |
Datensatz im Suchindex
_version_ | 1804179443461128192 |
---|---|
adam_text | Contents Preface xi 1 Introduction to Cryptology 1.1 Basic Terminology.................................................................. 1.2 Cryptology in Practice............................................................ 1.3 Why Study Cryptology?......................................................... 1 2 2 4 2 Substitution Ciphers 2.1 Keyword SubstitutionCiphers................................................. 2.1.1 Simple Keyword Substitution Ciphers..................... 2.1.2 Keyword Columnar Substitution Ciphers............... 2.1.3 Exercises..................................................................... 2.2. Cryptanalysis of Substitution Ciphers................................. 2.2.1 Exercises..................................................................... 2.3 Playfair Ciphers ..................................................................... 2.3.1 Exercises..................................................................... 2.4 The Navajo Code..................................................................... 2.4.1 Exercises..................................................................... 7 7 8 9 10 11 17 19 21 22 27 3 Transposition Ciphers 3.1 Columnar Transposition Ciphers.......................................... 3.1.1 Simple Columnar Transposition Ciphers.................. 3.1.2 Keyword Columnar Transposition Ciphers............... 3.1.3 Exercises..................................................................... 3.2 Cryptanalysis of Transposition Ciphers................................. 3.2.1 Cryptanalysis of Simple Columnar
Ciphers............ 3.2.2 Cryptanalysis of Keyword Columnar Ciphers .... 3.2.3 Exercises..................................................................... 3.3 ADFGX and ADFGVXCiphers.............................................. 3.3.1 Exercises.................................................................... 29 29 30 32 34 36 36 38 40 41 44 v
CONTENTS Vi 4 The Enigma Machine 4.1 4.2 4.3 The Enigma Cipher Machine.................................................. 4.1.1 Exercises....................................................................... Combinatorics .......................................................................... 4.2.1 The Multiplication Principle ..................................... 4.2.2 Permutations................................................................. 4.2.3 Combinations................................................................. 4.2.4 Exercises....................................................................... Security of the Enigma Machine ........................................... 4.3.1 Number of Initial Configurations............................... 4.3.2 Background on Cryptanalysis..................................... 4.3.3 Exercises....................................................................... 5 The Turing Bombe 5.1 5.2 5.3 5.4 5.5 5.6 5.7 5.8 6.2 6.3 6.4 6.5 47 61 65 65 67 70 72 75 75 78 81 83 Cribs and Menus....................................................................... 83 5.1.1 Exercises....................................................................... 88 Loops and Logical Inconsistencies........................................... ■ 90 5.2.1 Exercises....................................................................... 92 Searching for the Correct Configuration............................... 92 5.3.1 Exercises....................................................................... 106 The Diagonal
Board.............................................. 114 5.4.1 Exercises....................................................................... 120 The Checking Machine.............................................................. 124 5.5.1 Exercises....................................................................... 130 Turnovers................................................................................... 139 5.6.1 Exercises....................................................................... 143 Clonking....................................................................................... 150 5.7.1 Exercises....................................................................... 155 Final Observations.................................................................... 164 5.8.1 Exercises....................................................................... 166 6 Shift and Affine Ciphers 6.1 47 Modular Arithmetic................................................................. 6.1.1 Exercises....................................................................... Shift Ciphers............................................................................. 6.2.1 Exercises....................................................................... Cryptanalysis of Shift Ciphers.................................................. 6.3.1 Exercises....................................................................... Affine Ciphers............................................................................. 6.4.1
Exercises....................................................................... Cryptanalysis of Affine Ciphers............................................... 6.5.1 Exercises....................................................................... 167 167 176 178 181 183 185 187 189 190 192
CONTENTS 7 Alberti and Vigenère Ciphers 7.1 7.2 7.3 7.4 7.5 7.6 8.2 8.3 Matrices....................................................................................... 8.1.1 Definition and Basic Terminology............................... 8.1.2 Matrix Operations........................................................ 8.1.3 Identity and Inverse Matrices..................................... 8.1.4 Matrices with Modular Arithmetic............................ 8.1.5 Exercises....................................................................... Hill Ciphers................................................................................. 8.2.1 Exercises....................................................................... Cryptanalysis of Hill Ciphers.................................................. 8.3.1 Exercises....................................................................... 9 RSA Ciphers 9.1 9.2 9.3 9.4 9.5 195 Alberti Ciphers.......................................................................... 196 7.1.1 Exercises....................................................................... 199 Vigenère Ciphers....................................................................... 201 7.2.1 Vigenère Autokey Ciphers........................................... 201 7.2.2 Vigenère Keyword Ciphers ........................................ 204 7.2.3 Exercises....................................................................... 205 Probability................................................................................. 207 7.3.1
Exercises....................................................................... 213 The Friedman Test.................................................................... 215 7.4.1 The Index of Coincidence........................................... 216 7.4.2 Estimating the Keyword Length............................... 220 7.4.3 Exercises....................................................................... 222 The Kasiski Test....................................................................... 224 7.5.1 Exercises....................................................................... 225 Cryptanalysis of Vigenère Keyword Ciphers......................... 226 7.6.1 Finding the Keyword Length Using Signatures . . . 228 7.6.2 Finding the Keyword Letters Using Scrawls............ 233 7.6.3 Exercises ....................................................................... 237 8 Hill Ciphers 8.1 vii Introduction to Public-Key Ciphers........................................ 9.1.1 Exercises....................................................................... Introduction to RSA Ciphers.................................................. 9.2.1 Exercises....................................................................... The Euclidean Algorithm........................................................ 9.3.1 Exercises....................................................................... Modular Exponentiation........................................................... 9.4.1 Exercises.......................................................................
ASCII.......................................................................................... 9.5.1 Exercise.......................................................................... 249 249 250 251 256 259 262 266 273 275 279 283 283 285 286 289 289 294 296 301 301 302
CONTENTS viii 9.6 RSA Ciphers............................................................................. 9.6.1 Exercises....................................................................... 9.7 Cryptanalysis of RSA Ciphers.................................................. 9.7.1 Exercises....................................................................... 9.8 Primality Testing....................................................................... 9.8.1 Exercises....................................................................... 9.9 Integer Factorization................................................................. 9.9.1 Exercises....................................................................... 9.10 The RSA Factoring Challenges.............................................. 9.10.1 Exercises....................................................................... 10 ElGamal Ciphers 10.1 The Diffie-Hellman Key Exchange ........................................ 10.1.1 Exercises....................................................................... 10.2 Discrete Logarithms................................................................. 10.2.1 Exercises....................................................................... 10.3 ElGamal Ciphers....................................................................... 10.3.1 Exercises....................................................................... 10.4 Cryptanalysis of ElGamal Ciphers........................................ 10.4.1 Exercises.......................................................................
11 The Advanced Encryption Standard 11.1 Representations of Numbers..................................................... 11.1.1 Binary............................................................................. 11.1.2 Hexadecimal................................................................. 11.1.3 Exercises....................................................................... 11.2 Stream Ciphers.......................................................................... 11.2.1 Exercises....................................................................... 11.3 AES Preliminaries.................................................................... 11.3.1 Plaintext Format........................................................... 11.3.2 TheS-Box....................................................................... 11.3.3 Key Format and Generation........................................ 11.3.4 Exercises....................................................................... 11.4 AES Encryption....................................................................... 11.4.1 Overview....................................................................... 11.4.2 The Operations.............................................................. 11.4.3 Exercises....................................................................... 11.5 AES Decryption ....................................................................... 11.5.1 Exercises....................................................................... 11.6 AES
Security............................................................................. 11.6.1 Exercises....................................................................... 303 307 309 312 314 317 318 321 321 322 323 324 326 328 330 331 337 339 343 345 345 346 349 352 354 358 360 361 362 364 370 371 372 373 380 383 393 396 397
CONTENTS 12 Message Authentication ix 399 12.1 RSA Signatures........................................................................... 400 12.1.1 Exercises....................................................................... 406 12.2 Hash Functions.......................................................................... 409 12.2.1 Exercises....................................................................... 414 12.3 RSA Signatures with Hashing.................................................. 417 12.3.1 Exercises....................................................................... 420 12.4 The Man-in-the-Middle Attack............................................... 423 12.4.1 Exercises....................................................................... 425 12.5 Public-Key Infrastructures........................................................ 426 12.5.1 Key Formation.............................................................. 427 12.5.2 Web of Trust................................................................. 428 12.5.3 X.509 Certificates ........................................................ 429 12.5.4 Exercises....................................................................... 432 Bibliography 435 Hints and Answers for Selected Exercises 437 Index 469
|
any_adam_object | 1 |
author | Klima, Richard E. 1970- Sigmon, Neil P. |
author_GND | (DE-588)135945402 (DE-588)104364380X |
author_facet | Klima, Richard E. 1970- Sigmon, Neil P. |
author_role | aut aut |
author_sort | Klima, Richard E. 1970- |
author_variant | r e k re rek n p s np nps |
building | Verbundindex |
bvnumber | BV045504963 |
callnumber-first | T - Technology |
callnumber-label | TK5102 |
callnumber-raw | TK5102.94 |
callnumber-search | TK5102.94 |
callnumber-sort | TK 45102.94 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1098188222 (DE-599)BVBBV045504963 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01648nam a2200445 c 4500</leader><controlfield tag="001">BV045504963</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200211 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">190311s2019 xxua||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">018028365</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781138047624</subfield><subfield code="c">hbk.</subfield><subfield code="9">978-1-138-04762-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1098188222</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045504963</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5102.94</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Klima, Richard E.</subfield><subfield code="d">1970-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)135945402</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptology</subfield><subfield code="b">classical and modern</subfield><subfield code="c">Richard Klima, Neil P. Sigmon</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton ; London ; New York</subfield><subfield code="b">Taylor & Francis</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 482 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ciphers</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sigmon, Neil P.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)104364380X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030889582&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030889582</subfield></datafield></record></collection> |
id | DE-604.BV045504963 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:19:57Z |
institution | BVB |
isbn | 9781138047624 |
language | English |
lccn | 018028365 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030889582 |
oclc_num | 1098188222 |
open_access_boolean | |
owner | DE-739 DE-11 |
owner_facet | DE-739 DE-11 |
physical | xiii, 482 Seiten Illustrationen, Diagramme |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Taylor & Francis |
record_format | marc |
spelling | Klima, Richard E. 1970- Verfasser (DE-588)135945402 aut Cryptology classical and modern Richard Klima, Neil P. Sigmon second edition Boca Raton ; London ; New York Taylor & Francis [2019] © 2019 xiii, 482 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Cryptography Cryptography Data processing Data encryption (Computer science) Ciphers Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Sigmon, Neil P. Verfasser (DE-588)104364380X aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030889582&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Klima, Richard E. 1970- Sigmon, Neil P. Cryptology classical and modern Cryptography Cryptography Data processing Data encryption (Computer science) Ciphers Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Cryptology classical and modern |
title_auth | Cryptology classical and modern |
title_exact_search | Cryptology classical and modern |
title_full | Cryptology classical and modern Richard Klima, Neil P. Sigmon |
title_fullStr | Cryptology classical and modern Richard Klima, Neil P. Sigmon |
title_full_unstemmed | Cryptology classical and modern Richard Klima, Neil P. Sigmon |
title_short | Cryptology |
title_sort | cryptology classical and modern |
title_sub | classical and modern |
topic | Cryptography Cryptography Data processing Data encryption (Computer science) Ciphers Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptography Cryptography Data processing Data encryption (Computer science) Ciphers Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030889582&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT klimaricharde cryptologyclassicalandmodern AT sigmonneilp cryptologyclassicalandmodern |