Cryptology : (Record no. 2941)

MARC details
000 -LEADER
fixed length control field 05219cam a22002298a 4500
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781439872413 (hardcover : alk. paper)
040 ## - CATALOGING SOURCE
Transcribing agency CUS
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Item number KLI/C
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Klima, Richard E.
245 10 - TITLE STATEMENT
Title Cryptology :
Sub title classical and modern with maplets /
Statement of responsibility, etc. Richard E. Klima, Neil P. Sigmon.
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Boca Raton, FL
Name of publisher, distributor, etc. CRC Press,
Date of publication, distribution, etc. c2012.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 541 p. :
Other physical details ill. ;
Dimensions 24 cm.
440 #0 - SERIES
Title Discrete mathematics and its applications
500 ## - GENERAL NOTE
General note "A Chapman & Hall book."
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Introduction to Cryptology<br/>1.1 Basic Terminology .<br/>1.2 Cryptology in Practice .<br/>1.3 Why Study Cryptology?<br/>Substitution Ciphers<br/>2.1 Keyword Substitution Ciphers . .<br/>2.1.1 Simple Keyword Substitution Ciphers . .<br/>2.1.2 Keyword Columnar Substitution Ciphers<br/>2.2 A Maplet for Substitution Ciphers . .<br/>2.3 Cryptanalysis of Substitution Ciphers<br/>2.4 A Maplet for Cryptanalysis of Substitution Ciphers<br/>2.5 Playfair Ciphers .<br/>2.6 A Maplet for Playfair Ciphers .<br/>Transposition Ciphers<br/>3.1 Columnar Transposition Ciphers<br/>3.1.1 Simple Columnar Transposition Ciphers . .<br/>3.1.2 Keyword Columnar Transposition Ciphers .<br/>3.2 A Maplet for Transposition Ciphers . .<br/>3.3 Cryptanalysis of Transposition Ciphers .<br/>3.3.1 Cryptanalysis of Simple Columnar Ciphers<br/>3.3.2 Cryptanalysis of Keyword Columnar Ciphers<br/>3.4 Maplets for Cryptanalysis of Transposition Ciphers<br/>3.5 ADFGX and ADFGVX Ciphers . .<br/>3.6 A Maplet for ADFGX and ADFGVX Ciphers<br/>The Enigma Machine and Navajo Code<br/>4.1 The Enigma Cipher Machine .<br/>4.2 A Maplet for the Enigma Cipher Machine<br/>4.3 Combinatorics .<br/>4.3.1 The Multiplication Principle<br/>4.3.2 Permutations .<br/>4.3.3 Combinations .<br/>4.4 Cryptanalysis of the Enigma Cipher Machine<br/>4.4.1 Calculating the Number of Initial Configurations<br/>4.4.2 Some History of Cryptanalysis of the Enigma . .<br/>4.5 The Navajo Code .<br/>4.6 A Maplet for the Navajo Code<br/>5 Shift and Affine Ciphers<br/>5.1 Modular Arithmetic .<br/>5.2 A Maplet for Modular Reduction<br/>5.3 Shift Ciphers . .<br/>5.4 A Maplet for Shift Ciphers<br/>5.5 Cryptanalysis of Shift Ciphers . .<br/>5.6 A Maplet for Cryptanalysis of Shift Ciphers .<br/>5.7 Affine Ciphers . . .<br/>5.8 A Maplet for Affine Ciphers . .<br/>5.9 Cryptanalysis of Affine Ciphers<br/>5.10 A Maplet for Cryptanalysis of Affine Ciphers<br/>6 Alberti and Vigenere Ciphers<br/>6.1 Alberti Ciphers .<br/>6.2 A Maplet for Alberti Ciphers . .<br/>6.3 Vigenere Ciphers .<br/>6.3.1 Vigenere Autokey Ciphers .<br/>6.3.2 Vigenere Keyword Ciphers<br/>6.4 A Maplet for Vigenere Keyword Ciphers . .<br/>6.5 Probability . .<br/>6.6 The Friedman Test . .<br/>6.6.1 The Index of Coincidence . . .<br/>6.6.2 Estimating the Keyword Length<br/>6.7 A Maplet for the Friedman Test. . . .<br/>6.8 The Kasiski Test .<br/>6.9 A Maplet for the Kasiski Test . .<br/>6.10 Cryptanalysis of Vigenere Keyword Ciphers<br/>6.10.1 Finding the Keyword Length Using Signatures . .<br/>6.10.2 Finding the Keyword Letters Using Scrawls<br/>6.11 A Maplet for Cryptanalysis of Vigenere Keyword Ciphers<br/>xn<br/>7 Hill Ciphers<br/>7.1 Matrices .<br/>7.1.1 Definition and Basic Terminology .<br/>7.1.2 Matrix Operations<br/>7.1.3 Identity and Inverse Matrices .<br/>7.1.4 Matrices with Modular Arithmetic . .<br/>7.2 A Maplet for Matrix Computations .<br/>7.3 Hill Ciphers .<br/>7.4 A Maplet for Hill Ciphers . .<br/>7.5 Cryptanalysis of Hill Ciphers<br/>7.6 A Maplet for Cryptanalysis of Hill Ciphers<br/>8 RSA Ciphers<br/>8.1 Introduction to Public-Key Ciphers . .<br/>8.2 Introduction to RSA Ciphers .<br/>8.3 The Euclidean Algorithm . . .<br/>8.4 Maplets for the Euclidean Algorithm .<br/>8.5 Modular Exponentiation<br/>8.6 A Maplet for Modular Exponentiation<br/>8.7 ASCII<br/>8.8 RSA Ciphers<br/>8.9 Maplets for RSA Ciphers .<br/>8.10 Cryptanalysis of RSA Ciphers<br/>8.11 A Maplet for Cryptanalysis of RSA Ciphers<br/>8.12 Primality Testing<br/>8.13 Integer Factorization<br/>8.14 The RSA Factoring Challenges<br/>9 EIGamal Ciphers<br/>9.1 The Diffie-Hellman Key Exchange<br/>9.2 Maplets for the Diffie-Hellman Key Exchange<br/>9.3 Discrete Logarithms . .<br/>9.4 A Maplet for Discrete Logarithms<br/>9.5 EIGamal Ciphers . .<br/>9.6 Maplets for EIGamal Ciphers . . .<br/>9.7 Cryptanalysis of EIGamal Ciphers<br/>9.8 A Maplet for Cryptanalysis of EIGamal Ciphers<br/>10 The Advanced Encryption Standard<br/>10.1 Representations of Numbers . .<br/>10.1.1 Binary . . . .<br/>10.1.2 Hexadecimal<br/>10.2 A Maplet for Base Conversions<br/>10.3 Stream Ciphers .<br/>10.4 A Maplet for Stream Ciphers .<br/>10.5 AES Preliminaries .<br/>10.5.1 Plaintext Format .<br/>10.5.2 The S-Box<br/>10.5.3 Key Format and Generation .<br/>10.6 AES Encryption .<br/>10.6.1 Overview .<br/>10.6.2 The Operations .<br/>10.7 AES Decryption . .<br/>10.8 A Maplet for AES Ciphers .<br/>10.9 AES Security .<br/>11 Message Authentication<br/>11.1 RSA Signatures .<br/>11.2 Hash Functions .<br/>11.3 RSA Signatures with Hashing .<br/>11.4 Maplets for RSA Signatures . .<br/>11.5 The Man-in-the-Middle Attack<br/>11.6 A Maplet for the Man-in-the-Middle Attack<br/>11.7 Public-Key Infrastructures .<br/>11.7.1 Key Formation .<br/>11.7.2 Web of Trust . .<br/>11.7.3 X.509 Certificates .<br/>11.8 Maplets for X.509 Certificates
650 #0 - SUBJECT
Keyword Cryptography.
650 #0 - SUBJECT
Keyword Cryptography
General subdivision Data processing.
650 #0 - SUBJECT
Keyword Data encryption (Computer science)
650 #0 - SUBJECT
Keyword Ciphers.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type General Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Shelving location Date acquired Full call number Accession number Date last seen Date last checked out Koha item type
        Central Library, Sikkim University Central Library, Sikkim University General Book Section 15/06/2016 005.8/2 KLI/C P43939 20/07/2017 20/07/2017 General Books
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha