Basics of Contemporary Cryptography for IT Practitioners (Series on Coding Theory and Cryptology, 1) 🔍
Boris Ryabko and Andrey Fionov World Scientific Publishing Co Pte Ltd, Series on Coding Theory and Cryptology, Series on Coding Theory and Cryptology, 1, 2005
英语 [en] · PDF · 3.3MB · 2005 · 📘 非小说类图书 · 🚀/duxiu/lgli/lgrs/nexusstc/upload/zlib · Save
描述
the Aim Of This Book Is To Provide A Comprehensive Introduction To Cryptography Without Using Complex Mathematical Constructions. The Themes Are Conveyed In A Form That Only Requires A Basic Knowledge Of Mathematics, But The Methods Are Described In Sufficient Detail To Enable Their Computer Implementation. The Book Describes The Main Techniques And Facilities Of Contemporary Cryptography, Proving Key Results Along The Way. The Contents Of The First Five Chapters Can Be Used For One-semester Course.
备用文件名
nexusstc/Basics of Contemporary Cryptography for It Practitioners/88c1a1a903881ed162cfd1fb2ab87751.pdf
备用文件名
lgli/Y. dl_avaxhome 71977 _=BasCryptogr.pdf
备用文件名
lgrsnf/Y. dl_avaxhome 71977 _=BasCryptogr.pdf
备用文件名
zlib/Computers/Programming/Boris Ryabko, Andrey Fionov/Basics of Contemporary Cryptography for IT Practitioners_700508.pdf
备选标题
Handbook Of Software Engineering And Knowledge Engineering, Vol 3: Recent Advances Vol 3: Recent Advances
备选标题
Basics of Contemporary Cryptography for IT Practitioners (207 pages)
备选作者
Ryabko, Boris, Fionov, Andrey
备用出版商
World Scientific Publishing Company
备用版本
Series on coding theory and cryptology ;, 1, Singapore, Hoboken, NJ, New Jersey, 2005
备用版本
Series on coding theory and cryptology, v. 1, Singapore ; Hackensack, NJ, ©2005
备用版本
Series on coding theory and cryptology, v. 1, Online-ausg, Singapore, 2005
备用版本
Series on coding theory and cryptology, Singapore ; Hackensack NJ, c2005
备用版本
World Scientific Publishing Company, Singapore, 2005
备用版本
Singapore, Singapore
备用版本
2, 20050912
元数据中的注释
71977
元数据中的注释
avaxhome.ws
元数据中的注释
lg269997
元数据中的注释
producers:
Acrobat Distiller 5.0.5 (Windows)
元数据中的注释
{"container_title":"Series on Coding Theory and Cryptology","isbns":["9789812564054","9789812703309","9812564055","9812703306"],"issns":["1793-2238"],"last_page":208,"publisher":"WORLD SCIENTIFIC","series":"Series on Coding Theory and Cryptology, 1"}
元数据中的注释
Includes bibliographical references and index.
备用描述
Contents 8
Preface 6
Chapter 1 Introduction 12
Problems and Exercises 17
Chapter 2 Public Key Cryptosystems 18
2.1 Prehistory and Main Ideas 18
2.2 The First Public Key System - DiffieHellman Key Agreement 23
2.3 The Elements of Number Theory 26
2.4 Shamir Cipher 33
2.5 ElGamal Encryption 35
2.6 RSA Encryption and Trapdoor Functions 38
Problems and Exercises 41
Themes for Labs 43
Chapter 3 Solving Discrete Logarithm Problem 44
3.1 Problem Setting 44
3.2 The Baby-step Giant-step Algorithm 46
3.3 Index Calculus Algorithm 48
Problems and Exercises 53
Themes for Labs 53
Chapter 4 Digital Signatures 54
4.1 RSA Digital Signature 54
4.2 ElGamal Digital Signature 57
4.3 Digital Signature Standards 60
Problems and Exercises 63
Themes for Labs 64
Chapter 5 Cryptographic Protocols 66
5.1 Mental Poker 66
5.2 Zero Knowledge Proofs 70
5.2.1 Graph Colouring Problem 71
5.2.2 Hamiltonian Cycle Problem 74
5.3 Digital Cash 81
5.4 Mutual Identification with Key Establishment 87
Problems and Exercises 92
Themes for Labs 93
Chapter 6 Elliptic Curve Crypt osys t ems 94
6.1 Introduction 94
6.2 Mathematical Foundations 95
6.3 Choosing Curve Parameters 102
6.4 Constructing Cryptosystems 104
6.4.1 Elliptic Curve ElGamal Encryption 105
6.4.2 Elliptic Curve Digital Signature Algorithm 106
6.5 Efficient Implementation of Operations 106
6.6 Counting Points on Elliptic Curve 113
6.7 Using Standard Curves 121
Problems and Exercises 123
Themes for Labs 124
Chapter 7 Theoretical Security of Cryptosystems 126
7.1 Introduction 126
7.2 Theory of Perfect Secrecy 127
7.3 Vernam Cipher 129
7.4 Elements of Information Theory 130
7.5 Unicity Distance for Secret Key Cipher 136
7.6 Ideal Cryptosystems 141
Problems and Exercises 147
Chapter 8 Modern Secret Key Ciphers 148
8.1 Introduction 148
8.2 Block Ciphers 151
8.2.1 The GOST 28147-89 Block Cipher 152
8.2.2 The RC5 and RC6 Ciphers 155
8.2.3 The Rijndael (AES) Cipher 159
8.3 Main Modes of Operation of Block Ciphers 169
8.3.1 ECB Mode 170
8.3.2 CBC Mode 170
8.4 Stream Ciphers 171
8.4.1 The OFB Block Cipher Mode 173
8.4.2 The CTR Block Cipher Mode 174
8.4.3 The RC4 Algorithm 174
8.5 Cryptographic Hash Functions 176
Chapter 9 Random Numbers in Cryptography 180
9.1 Introduction 180
9.2 Refining Physical Random Number Generators 181
9.3 Pseudo-Random Number Generators 184
9.4 Statistical Tests for Random and Pseudo-Random Number Generators 186
9.5 Statistical Attack to Block Ciphers 189
Answers to Problems and Exercises 196
Bibliography 200
Author Index 204
Subject Index 206
开源日期
2010-05-31
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。