Cryptology : classical and modern with maplets / Richard E. Klima, Neil P. Sigmon.

By: Klima, Richard EMaterial type: TextTextSeries: Discrete mathematics and its applicationsPublication details: Boca Raton, FL CRC Press, c2012Description: xiv, 541 p. : ill. ; 24 cmISBN: 9781439872413 (hardcover : alk. paper)Subject(s): Cryptography | Cryptography -- Data processing | Data encryption (Computer science) | CiphersDDC classification: 005.8/2
Contents:
Introduction to Cryptology 1.1 Basic Terminology . 1.2 Cryptology in Practice . 1.3 Why Study Cryptology? Substitution Ciphers 2.1 Keyword Substitution Ciphers . . 2.1.1 Simple Keyword Substitution Ciphers . . 2.1.2 Keyword Columnar Substitution Ciphers 2.2 A Maplet for Substitution Ciphers . . 2.3 Cryptanalysis of Substitution Ciphers 2.4 A Maplet for Cryptanalysis of Substitution Ciphers 2.5 Playfair Ciphers . 2.6 A Maplet for Playfair Ciphers . Transposition Ciphers 3.1 Columnar Transposition Ciphers 3.1.1 Simple Columnar Transposition Ciphers . . 3.1.2 Keyword Columnar Transposition Ciphers . 3.2 A Maplet for Transposition Ciphers . . 3.3 Cryptanalysis of Transposition Ciphers . 3.3.1 Cryptanalysis of Simple Columnar Ciphers 3.3.2 Cryptanalysis of Keyword Columnar Ciphers 3.4 Maplets for Cryptanalysis of Transposition Ciphers 3.5 ADFGX and ADFGVX Ciphers . . 3.6 A Maplet for ADFGX and ADFGVX Ciphers The Enigma Machine and Navajo Code 4.1 The Enigma Cipher Machine . 4.2 A Maplet for the Enigma Cipher Machine 4.3 Combinatorics . 4.3.1 The Multiplication Principle 4.3.2 Permutations . 4.3.3 Combinations . 4.4 Cryptanalysis of the Enigma Cipher Machine 4.4.1 Calculating the Number of Initial Configurations 4.4.2 Some History of Cryptanalysis of the Enigma . . 4.5 The Navajo Code . 4.6 A Maplet for the Navajo Code 5 Shift and Affine Ciphers 5.1 Modular Arithmetic . 5.2 A Maplet for Modular Reduction 5.3 Shift Ciphers . . 5.4 A Maplet for Shift Ciphers 5.5 Cryptanalysis of Shift Ciphers . . 5.6 A Maplet for Cryptanalysis of Shift Ciphers . 5.7 Affine Ciphers . . . 5.8 A Maplet for Affine Ciphers . . 5.9 Cryptanalysis of Affine Ciphers 5.10 A Maplet for Cryptanalysis of Affine Ciphers 6 Alberti and Vigenere Ciphers 6.1 Alberti Ciphers . 6.2 A Maplet for Alberti Ciphers . . 6.3 Vigenere Ciphers . 6.3.1 Vigenere Autokey Ciphers . 6.3.2 Vigenere Keyword Ciphers 6.4 A Maplet for Vigenere Keyword Ciphers . . 6.5 Probability . . 6.6 The Friedman Test . . 6.6.1 The Index of Coincidence . . . 6.6.2 Estimating the Keyword Length 6.7 A Maplet for the Friedman Test. . . . 6.8 The Kasiski Test . 6.9 A Maplet for the Kasiski Test . . 6.10 Cryptanalysis of Vigenere Keyword Ciphers 6.10.1 Finding the Keyword Length Using Signatures . . 6.10.2 Finding the Keyword Letters Using Scrawls 6.11 A Maplet for Cryptanalysis of Vigenere Keyword Ciphers xn 7 Hill Ciphers 7.1 Matrices . 7.1.1 Definition and Basic Terminology . 7.1.2 Matrix Operations 7.1.3 Identity and Inverse Matrices . 7.1.4 Matrices with Modular Arithmetic . . 7.2 A Maplet for Matrix Computations . 7.3 Hill Ciphers . 7.4 A Maplet for Hill Ciphers . . 7.5 Cryptanalysis of Hill Ciphers 7.6 A Maplet for Cryptanalysis of Hill Ciphers 8 RSA Ciphers 8.1 Introduction to Public-Key Ciphers . . 8.2 Introduction to RSA Ciphers . 8.3 The Euclidean Algorithm . . . 8.4 Maplets for the Euclidean Algorithm . 8.5 Modular Exponentiation 8.6 A Maplet for Modular Exponentiation 8.7 ASCII 8.8 RSA Ciphers 8.9 Maplets for RSA Ciphers . 8.10 Cryptanalysis of RSA Ciphers 8.11 A Maplet for Cryptanalysis of RSA Ciphers 8.12 Primality Testing 8.13 Integer Factorization 8.14 The RSA Factoring Challenges 9 EIGamal Ciphers 9.1 The Diffie-Hellman Key Exchange 9.2 Maplets for the Diffie-Hellman Key Exchange 9.3 Discrete Logarithms . . 9.4 A Maplet for Discrete Logarithms 9.5 EIGamal Ciphers . . 9.6 Maplets for EIGamal Ciphers . . . 9.7 Cryptanalysis of EIGamal Ciphers 9.8 A Maplet for Cryptanalysis of EIGamal Ciphers 10 The Advanced Encryption Standard 10.1 Representations of Numbers . . 10.1.1 Binary . . . . 10.1.2 Hexadecimal 10.2 A Maplet for Base Conversions 10.3 Stream Ciphers . 10.4 A Maplet for Stream Ciphers . 10.5 AES Preliminaries . 10.5.1 Plaintext Format . 10.5.2 The S-Box 10.5.3 Key Format and Generation . 10.6 AES Encryption . 10.6.1 Overview . 10.6.2 The Operations . 10.7 AES Decryption . . 10.8 A Maplet for AES Ciphers . 10.9 AES Security . 11 Message Authentication 11.1 RSA Signatures . 11.2 Hash Functions . 11.3 RSA Signatures with Hashing . 11.4 Maplets for RSA Signatures . . 11.5 The Man-in-the-Middle Attack 11.6 A Maplet for the Man-in-the-Middle Attack 11.7 Public-Key Infrastructures . 11.7.1 Key Formation . 11.7.2 Web of Trust . . 11.7.3 X.509 Certificates . 11.8 Maplets for X.509 Certificates
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
General Books General Books Central Library, Sikkim University
General Book Section
005.8/2 KLI/C (Browse shelf(Opens below)) Available P43939
Total holds: 0

"A Chapman & Hall book."

Includes bibliographical references and index.

Introduction to Cryptology
1.1 Basic Terminology .
1.2 Cryptology in Practice .
1.3 Why Study Cryptology?
Substitution Ciphers
2.1 Keyword Substitution Ciphers . .
2.1.1 Simple Keyword Substitution Ciphers . .
2.1.2 Keyword Columnar Substitution Ciphers
2.2 A Maplet for Substitution Ciphers . .
2.3 Cryptanalysis of Substitution Ciphers
2.4 A Maplet for Cryptanalysis of Substitution Ciphers
2.5 Playfair Ciphers .
2.6 A Maplet for Playfair Ciphers .
Transposition Ciphers
3.1 Columnar Transposition Ciphers
3.1.1 Simple Columnar Transposition Ciphers . .
3.1.2 Keyword Columnar Transposition Ciphers .
3.2 A Maplet for Transposition Ciphers . .
3.3 Cryptanalysis of Transposition Ciphers .
3.3.1 Cryptanalysis of Simple Columnar Ciphers
3.3.2 Cryptanalysis of Keyword Columnar Ciphers
3.4 Maplets for Cryptanalysis of Transposition Ciphers
3.5 ADFGX and ADFGVX Ciphers . .
3.6 A Maplet for ADFGX and ADFGVX Ciphers
The Enigma Machine and Navajo Code
4.1 The Enigma Cipher Machine .
4.2 A Maplet for the Enigma Cipher Machine
4.3 Combinatorics .
4.3.1 The Multiplication Principle
4.3.2 Permutations .
4.3.3 Combinations .
4.4 Cryptanalysis of the Enigma Cipher Machine
4.4.1 Calculating the Number of Initial Configurations
4.4.2 Some History of Cryptanalysis of the Enigma . .
4.5 The Navajo Code .
4.6 A Maplet for the Navajo Code
5 Shift and Affine Ciphers
5.1 Modular Arithmetic .
5.2 A Maplet for Modular Reduction
5.3 Shift Ciphers . .
5.4 A Maplet for Shift Ciphers
5.5 Cryptanalysis of Shift Ciphers . .
5.6 A Maplet for Cryptanalysis of Shift Ciphers .
5.7 Affine Ciphers . . .
5.8 A Maplet for Affine Ciphers . .
5.9 Cryptanalysis of Affine Ciphers
5.10 A Maplet for Cryptanalysis of Affine Ciphers
6 Alberti and Vigenere Ciphers
6.1 Alberti Ciphers .
6.2 A Maplet for Alberti Ciphers . .
6.3 Vigenere Ciphers .
6.3.1 Vigenere Autokey Ciphers .
6.3.2 Vigenere Keyword Ciphers
6.4 A Maplet for Vigenere Keyword Ciphers . .
6.5 Probability . .
6.6 The Friedman Test . .
6.6.1 The Index of Coincidence . . .
6.6.2 Estimating the Keyword Length
6.7 A Maplet for the Friedman Test. . . .
6.8 The Kasiski Test .
6.9 A Maplet for the Kasiski Test . .
6.10 Cryptanalysis of Vigenere Keyword Ciphers
6.10.1 Finding the Keyword Length Using Signatures . .
6.10.2 Finding the Keyword Letters Using Scrawls
6.11 A Maplet for Cryptanalysis of Vigenere Keyword Ciphers
xn
7 Hill Ciphers
7.1 Matrices .
7.1.1 Definition and Basic Terminology .
7.1.2 Matrix Operations
7.1.3 Identity and Inverse Matrices .
7.1.4 Matrices with Modular Arithmetic . .
7.2 A Maplet for Matrix Computations .
7.3 Hill Ciphers .
7.4 A Maplet for Hill Ciphers . .
7.5 Cryptanalysis of Hill Ciphers
7.6 A Maplet for Cryptanalysis of Hill Ciphers
8 RSA Ciphers
8.1 Introduction to Public-Key Ciphers . .
8.2 Introduction to RSA Ciphers .
8.3 The Euclidean Algorithm . . .
8.4 Maplets for the Euclidean Algorithm .
8.5 Modular Exponentiation
8.6 A Maplet for Modular Exponentiation
8.7 ASCII
8.8 RSA Ciphers
8.9 Maplets for RSA Ciphers .
8.10 Cryptanalysis of RSA Ciphers
8.11 A Maplet for Cryptanalysis of RSA Ciphers
8.12 Primality Testing
8.13 Integer Factorization
8.14 The RSA Factoring Challenges
9 EIGamal Ciphers
9.1 The Diffie-Hellman Key Exchange
9.2 Maplets for the Diffie-Hellman Key Exchange
9.3 Discrete Logarithms . .
9.4 A Maplet for Discrete Logarithms
9.5 EIGamal Ciphers . .
9.6 Maplets for EIGamal Ciphers . . .
9.7 Cryptanalysis of EIGamal Ciphers
9.8 A Maplet for Cryptanalysis of EIGamal Ciphers
10 The Advanced Encryption Standard
10.1 Representations of Numbers . .
10.1.1 Binary . . . .
10.1.2 Hexadecimal
10.2 A Maplet for Base Conversions
10.3 Stream Ciphers .
10.4 A Maplet for Stream Ciphers .
10.5 AES Preliminaries .
10.5.1 Plaintext Format .
10.5.2 The S-Box
10.5.3 Key Format and Generation .
10.6 AES Encryption .
10.6.1 Overview .
10.6.2 The Operations .
10.7 AES Decryption . .
10.8 A Maplet for AES Ciphers .
10.9 AES Security .
11 Message Authentication
11.1 RSA Signatures .
11.2 Hash Functions .
11.3 RSA Signatures with Hashing .
11.4 Maplets for RSA Signatures . .
11.5 The Man-in-the-Middle Attack
11.6 A Maplet for the Man-in-the-Middle Attack
11.7 Public-Key Infrastructures .
11.7.1 Key Formation .
11.7.2 Web of Trust . .
11.7.3 X.509 Certificates .
11.8 Maplets for X.509 Certificates

There are no comments on this title.

to post a comment.
SIKKIM UNIVERSITY
University Portal | Contact Librarian | Library Portal

Powered by Koha