Klima, Richard E.

Cryptology : classical and modern with maplets / Richard E. Klima, Neil P. Sigmon. - Boca Raton, FL CRC Press, c2012. - xiv, 541 p. : ill. ; 24 cm. - Discrete mathematics and its applications .

"A Chapman & Hall book."

Includes bibliographical references and index.

Introduction to Cryptology
1.1 Basic Terminology .
1.2 Cryptology in Practice .
1.3 Why Study Cryptology?
Substitution Ciphers
2.1 Keyword Substitution Ciphers . .
2.1.1 Simple Keyword Substitution Ciphers . .
2.1.2 Keyword Columnar Substitution Ciphers
2.2 A Maplet for Substitution Ciphers . .
2.3 Cryptanalysis of Substitution Ciphers
2.4 A Maplet for Cryptanalysis of Substitution Ciphers
2.5 Playfair Ciphers .
2.6 A Maplet for Playfair Ciphers .
Transposition Ciphers
3.1 Columnar Transposition Ciphers
3.1.1 Simple Columnar Transposition Ciphers . .
3.1.2 Keyword Columnar Transposition Ciphers .
3.2 A Maplet for Transposition Ciphers . .
3.3 Cryptanalysis of Transposition Ciphers .
3.3.1 Cryptanalysis of Simple Columnar Ciphers
3.3.2 Cryptanalysis of Keyword Columnar Ciphers
3.4 Maplets for Cryptanalysis of Transposition Ciphers
3.5 ADFGX and ADFGVX Ciphers . .
3.6 A Maplet for ADFGX and ADFGVX Ciphers
The Enigma Machine and Navajo Code
4.1 The Enigma Cipher Machine .
4.2 A Maplet for the Enigma Cipher Machine
4.3 Combinatorics .
4.3.1 The Multiplication Principle
4.3.2 Permutations .
4.3.3 Combinations .
4.4 Cryptanalysis of the Enigma Cipher Machine
4.4.1 Calculating the Number of Initial Configurations
4.4.2 Some History of Cryptanalysis of the Enigma . .
4.5 The Navajo Code .
4.6 A Maplet for the Navajo Code
5 Shift and Affine Ciphers
5.1 Modular Arithmetic .
5.2 A Maplet for Modular Reduction
5.3 Shift Ciphers . .
5.4 A Maplet for Shift Ciphers
5.5 Cryptanalysis of Shift Ciphers . .
5.6 A Maplet for Cryptanalysis of Shift Ciphers .
5.7 Affine Ciphers . . .
5.8 A Maplet for Affine Ciphers . .
5.9 Cryptanalysis of Affine Ciphers
5.10 A Maplet for Cryptanalysis of Affine Ciphers
6 Alberti and Vigenere Ciphers
6.1 Alberti Ciphers .
6.2 A Maplet for Alberti Ciphers . .
6.3 Vigenere Ciphers .
6.3.1 Vigenere Autokey Ciphers .
6.3.2 Vigenere Keyword Ciphers
6.4 A Maplet for Vigenere Keyword Ciphers . .
6.5 Probability . .
6.6 The Friedman Test . .
6.6.1 The Index of Coincidence . . .
6.6.2 Estimating the Keyword Length
6.7 A Maplet for the Friedman Test. . . .
6.8 The Kasiski Test .
6.9 A Maplet for the Kasiski Test . .
6.10 Cryptanalysis of Vigenere Keyword Ciphers
6.10.1 Finding the Keyword Length Using Signatures . .
6.10.2 Finding the Keyword Letters Using Scrawls
6.11 A Maplet for Cryptanalysis of Vigenere Keyword Ciphers
xn
7 Hill Ciphers
7.1 Matrices .
7.1.1 Definition and Basic Terminology .
7.1.2 Matrix Operations
7.1.3 Identity and Inverse Matrices .
7.1.4 Matrices with Modular Arithmetic . .
7.2 A Maplet for Matrix Computations .
7.3 Hill Ciphers .
7.4 A Maplet for Hill Ciphers . .
7.5 Cryptanalysis of Hill Ciphers
7.6 A Maplet for Cryptanalysis of Hill Ciphers
8 RSA Ciphers
8.1 Introduction to Public-Key Ciphers . .
8.2 Introduction to RSA Ciphers .
8.3 The Euclidean Algorithm . . .
8.4 Maplets for the Euclidean Algorithm .
8.5 Modular Exponentiation
8.6 A Maplet for Modular Exponentiation
8.7 ASCII
8.8 RSA Ciphers
8.9 Maplets for RSA Ciphers .
8.10 Cryptanalysis of RSA Ciphers
8.11 A Maplet for Cryptanalysis of RSA Ciphers
8.12 Primality Testing
8.13 Integer Factorization
8.14 The RSA Factoring Challenges
9 EIGamal Ciphers
9.1 The Diffie-Hellman Key Exchange
9.2 Maplets for the Diffie-Hellman Key Exchange
9.3 Discrete Logarithms . .
9.4 A Maplet for Discrete Logarithms
9.5 EIGamal Ciphers . .
9.6 Maplets for EIGamal Ciphers . . .
9.7 Cryptanalysis of EIGamal Ciphers
9.8 A Maplet for Cryptanalysis of EIGamal Ciphers
10 The Advanced Encryption Standard
10.1 Representations of Numbers . .
10.1.1 Binary . . . .
10.1.2 Hexadecimal
10.2 A Maplet for Base Conversions
10.3 Stream Ciphers .
10.4 A Maplet for Stream Ciphers .
10.5 AES Preliminaries .
10.5.1 Plaintext Format .
10.5.2 The S-Box
10.5.3 Key Format and Generation .
10.6 AES Encryption .
10.6.1 Overview .
10.6.2 The Operations .
10.7 AES Decryption . .
10.8 A Maplet for AES Ciphers .
10.9 AES Security .
11 Message Authentication
11.1 RSA Signatures .
11.2 Hash Functions .
11.3 RSA Signatures with Hashing .
11.4 Maplets for RSA Signatures . .
11.5 The Man-in-the-Middle Attack
11.6 A Maplet for the Man-in-the-Middle Attack
11.7 Public-Key Infrastructures .
11.7.1 Key Formation .
11.7.2 Web of Trust . .
11.7.3 X.509 Certificates .
11.8 Maplets for X.509 Certificates

9781439872413 (hardcover : alk. paper)


Cryptography.
Cryptography--Data processing.
Data encryption (Computer science)
Ciphers.

005.8/2 / KLI/C