TY - BOOK AU - Klima,Richard E. TI - Cryptology: classical and modern with maplets SN - 9781439872413 (hardcover : alk. paper) U1 - 005.8/2 PY - 2012/// CY - Boca Raton, FL PB - CRC Press KW - Cryptography KW - Data processing KW - Data encryption (Computer science) KW - Ciphers N1 - "A Chapman & Hall book."; Includes bibliographical references and index; Introduction to Cryptology 1.1 Basic Terminology . 1.2 Cryptology in Practice . 1.3 Why Study Cryptology? Substitution Ciphers 2.1 Keyword Substitution Ciphers . . 2.1.1 Simple Keyword Substitution Ciphers . . 2.1.2 Keyword Columnar Substitution Ciphers 2.2 A Maplet for Substitution Ciphers . . 2.3 Cryptanalysis of Substitution Ciphers 2.4 A Maplet for Cryptanalysis of Substitution Ciphers 2.5 Playfair Ciphers . 2.6 A Maplet for Playfair Ciphers . Transposition Ciphers 3.1 Columnar Transposition Ciphers 3.1.1 Simple Columnar Transposition Ciphers . . 3.1.2 Keyword Columnar Transposition Ciphers . 3.2 A Maplet for Transposition Ciphers . . 3.3 Cryptanalysis of Transposition Ciphers . 3.3.1 Cryptanalysis of Simple Columnar Ciphers 3.3.2 Cryptanalysis of Keyword Columnar Ciphers 3.4 Maplets for Cryptanalysis of Transposition Ciphers 3.5 ADFGX and ADFGVX Ciphers . . 3.6 A Maplet for ADFGX and ADFGVX Ciphers The Enigma Machine and Navajo Code 4.1 The Enigma Cipher Machine . 4.2 A Maplet for the Enigma Cipher Machine 4.3 Combinatorics . 4.3.1 The Multiplication Principle 4.3.2 Permutations . 4.3.3 Combinations . 4.4 Cryptanalysis of the Enigma Cipher Machine 4.4.1 Calculating the Number of Initial Configurations 4.4.2 Some History of Cryptanalysis of the Enigma . . 4.5 The Navajo Code . 4.6 A Maplet for the Navajo Code 5 Shift and Affine Ciphers 5.1 Modular Arithmetic . 5.2 A Maplet for Modular Reduction 5.3 Shift Ciphers . . 5.4 A Maplet for Shift Ciphers 5.5 Cryptanalysis of Shift Ciphers . . 5.6 A Maplet for Cryptanalysis of Shift Ciphers . 5.7 Affine Ciphers . . . 5.8 A Maplet for Affine Ciphers . . 5.9 Cryptanalysis of Affine Ciphers 5.10 A Maplet for Cryptanalysis of Affine Ciphers 6 Alberti and Vigenere Ciphers 6.1 Alberti Ciphers . 6.2 A Maplet for Alberti Ciphers . . 6.3 Vigenere Ciphers . 6.3.1 Vigenere Autokey Ciphers . 6.3.2 Vigenere Keyword Ciphers 6.4 A Maplet for Vigenere Keyword Ciphers . . 6.5 Probability . . 6.6 The Friedman Test . . 6.6.1 The Index of Coincidence . . . 6.6.2 Estimating the Keyword Length 6.7 A Maplet for the Friedman Test. . . . 6.8 The Kasiski Test . 6.9 A Maplet for the Kasiski Test . . 6.10 Cryptanalysis of Vigenere Keyword Ciphers 6.10.1 Finding the Keyword Length Using Signatures . . 6.10.2 Finding the Keyword Letters Using Scrawls 6.11 A Maplet for Cryptanalysis of Vigenere Keyword Ciphers xn 7 Hill Ciphers 7.1 Matrices . 7.1.1 Definition and Basic Terminology . 7.1.2 Matrix Operations 7.1.3 Identity and Inverse Matrices . 7.1.4 Matrices with Modular Arithmetic . . 7.2 A Maplet for Matrix Computations . 7.3 Hill Ciphers . 7.4 A Maplet for Hill Ciphers . . 7.5 Cryptanalysis of Hill Ciphers 7.6 A Maplet for Cryptanalysis of Hill Ciphers 8 RSA Ciphers 8.1 Introduction to Public-Key Ciphers . . 8.2 Introduction to RSA Ciphers . 8.3 The Euclidean Algorithm . . . 8.4 Maplets for the Euclidean Algorithm . 8.5 Modular Exponentiation 8.6 A Maplet for Modular Exponentiation 8.7 ASCII 8.8 RSA Ciphers 8.9 Maplets for RSA Ciphers . 8.10 Cryptanalysis of RSA Ciphers 8.11 A Maplet for Cryptanalysis of RSA Ciphers 8.12 Primality Testing 8.13 Integer Factorization 8.14 The RSA Factoring Challenges 9 EIGamal Ciphers 9.1 The Diffie-Hellman Key Exchange 9.2 Maplets for the Diffie-Hellman Key Exchange 9.3 Discrete Logarithms . . 9.4 A Maplet for Discrete Logarithms 9.5 EIGamal Ciphers . . 9.6 Maplets for EIGamal Ciphers . . . 9.7 Cryptanalysis of EIGamal Ciphers 9.8 A Maplet for Cryptanalysis of EIGamal Ciphers 10 The Advanced Encryption Standard 10.1 Representations of Numbers . . 10.1.1 Binary . . . . 10.1.2 Hexadecimal 10.2 A Maplet for Base Conversions 10.3 Stream Ciphers . 10.4 A Maplet for Stream Ciphers . 10.5 AES Preliminaries . 10.5.1 Plaintext Format . 10.5.2 The S-Box 10.5.3 Key Format and Generation . 10.6 AES Encryption . 10.6.1 Overview . 10.6.2 The Operations . 10.7 AES Decryption . . 10.8 A Maplet for AES Ciphers . 10.9 AES Security . 11 Message Authentication 11.1 RSA Signatures . 11.2 Hash Functions . 11.3 RSA Signatures with Hashing . 11.4 Maplets for RSA Signatures . . 11.5 The Man-in-the-Middle Attack 11.6 A Maplet for the Man-in-the-Middle Attack 11.7 Public-Key Infrastructures . 11.7.1 Key Formation . 11.7.2 Web of Trust . . 11.7.3 X.509 Certificates . 11.8 Maplets for X.509 Certificates ER -