Syndetics cover image
Image from Syndetics

Cryptography, Information Theory, and Error-Correction [electronic resource] : A Handbook for the 21st Century

By: Contributor(s): Material type: Computer fileComputer filePublisher number: 9780471653172Series: Wiley Series in Discrete Mathematics and OptimizationPublication details: New York : Wiley, 2011.ISBN:
  • 9781118031384
Subject(s): Genre/Form: Additional physical formats: Print version:: Cryptography, Information Theory, and Error-Correction : A Handbook for the 21st CenturyDDC classification:
  • 005.8
LOC classification:
  • QA76.9.A25 B79 2011
Online resources:
Contents:
Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century; Contents; Preface; I Cryptography; 1 History and Claude E. Shannon; 1.1 Historical Background; 1.2 Brief Biography of Claude E. Shannon; 1.3 Career; 1.4 Personal-Professional; 1.5 Scientific Legacy; 1.6 Modern Developments; 2 Classical Ciphers and Their Cryptanalysis; 2.1 Introduction; 2.2 The Caesar Cipher; 2.3 The Scytale Cipher; 2.4 The Vigenère Cipher; 2.5 The Enigma Machine and Its Mathematics; 2.6 Frequency Analysis; 2.7 Breaking the Vigenère Cipher, Babbage-Kasiski; 2.8 Modern Enciphering Systems
2.9 Problems2.10 Solutions; 3 RSA, Key Searches, SSL, and Encrypting Email; 3.1 Background; 3.2 The Basic Idea of Cryptography; 3.3 Public Key Cryptography and RSA on a Calculator; 3.4 The General RSA Algorithm; 3.5 Public Key Versus Symmetric Key; 3.6 Attacks, Security of DES, Key-spaces; 3.7 Summary of Encryption; 3.8 SSL (Secure Socket Layer); 3.9 PGP and GPG; 3.10 RSA Challenge; 3.11 Problems; 3.12 Solutions; 4 The Fundamentals of Modern Cryptography; 4.1 Encryption Revisited; 4.2 Block Ciphers, Shannon's Confusion and Diffusion; 4.3 Perfect Secrecy, Stream Ciphers, One-Time Pad
4.4 Hash Functions4.5 Message Integrity Using Symmetric Cryptography; 4.6 General Public Key Cryptosystems; 4.7 Electronic Signatures; 4.8 The Diffie-Hellman Key Exchange; 4.9 Quantum Encryption; 4.10 Key Management and Kerberos; 4.11 DES; 4.12 Problems; 4.13 Solutions; 5 DES, AES and Operating Modes; 5.1 The Data Encryption Standard Code; 5.2 Triple DES; 5.3 DES and Unix; 5.4 The Advanced Encryption Standard Code; 5.5 Problems; 5.6 Solutions; 6 Elliptic Curve Cryptography (ECC); 6.1 Abelian Integrals, Fields, Groups; 6.2 Curves, Cryptography; 6.3 Nonsingularity
6.4 The Hasse Theorem, and an Example6.5 More Examples; 6.6 The Group Law on Elliptic Curves; 6.7 Key Exchange with Elliptic Curves; 6.8 Elliptic Curves mod n; 6.9 Encoding Plain Text; 6.10 Security of ECC; 6.11 More Geometry of Cubic Curves; 6.12 Cubic Curves and Arcs; 6.13 Homogeneous Coordinates; 6.14 Fermat's Last Theorem, Elliptic Curves, Gerhard Frey; 6.15 Problems; 6.16 Solutions; 7 Attacks in Cryptography; 7.1 Cryptanalysis; 7.2 Soft Attacks; 7.3 Brute Force Attacks; 7.4 Man-In-The-Middle Attacks; 7.5 Known Plain Text Attacks; 7.6 Known Cipher Text Attacks
7.7 Chosen Plain Text Attacks7.8 Chosen Cipher Text Attacks, Digital Signatures; 7.9 Replay Attacks; 7.10 Birthday Attacks; 7.11 Birthday Attack on Digital Signatures; 7.12 Birthday Attack on the Discrete Log Problem; 7.13 Attacks on RSA; 7.14 Attacks on RSA using Low-Exponents; 7.15 Timing Attack; 7.16 Differential Cryptanalysis; 7.17 Implementation Errors and Unforeseen States; 8 Practical Issus; 8.1 Introduction; 8.2 Hot Issues; 8.3 Authentication; 8.4 E-Commerce; 8.5 E-Government; 8.6 Key Lengths; 8.7 Digital Rights; 8.8 Wireless Networks; 8.9 Communication Protocols
II Information Theory
Summary: Discover the first unified treatment of today's most essential information technologies- Compressing, Encrypting, and Encoding With identity theft, cybercrime, and digital file sharing proliferating in today's wired world, providing safe and accurate information transfers has become a paramount concern. The issues and problems raised in this endeavor are encompassed within three disciplines: cryptography, information theory, and error-correction. As technology continues to develop, these fields have converged at a practical level, increasing the need for a unified treatment of these three co
Holdings
Item type Home library Call number Status Date due Barcode Item holds
Electronic Resource Electronic Resource UH Online Library Ebooks Not for loan
Total holds: 0

Enhanced descriptions from Syndetics:

Description based upon print version of record.

Cryptography, Information Theory, and Error-Correction: A Handbook for the 21st Century; Contents; Preface; I Cryptography; 1 History and Claude E. Shannon; 1.1 Historical Background; 1.2 Brief Biography of Claude E. Shannon; 1.3 Career; 1.4 Personal-Professional; 1.5 Scientific Legacy; 1.6 Modern Developments; 2 Classical Ciphers and Their Cryptanalysis; 2.1 Introduction; 2.2 The Caesar Cipher; 2.3 The Scytale Cipher; 2.4 The Vigenère Cipher; 2.5 The Enigma Machine and Its Mathematics; 2.6 Frequency Analysis; 2.7 Breaking the Vigenère Cipher, Babbage-Kasiski; 2.8 Modern Enciphering Systems

2.9 Problems2.10 Solutions; 3 RSA, Key Searches, SSL, and Encrypting Email; 3.1 Background; 3.2 The Basic Idea of Cryptography; 3.3 Public Key Cryptography and RSA on a Calculator; 3.4 The General RSA Algorithm; 3.5 Public Key Versus Symmetric Key; 3.6 Attacks, Security of DES, Key-spaces; 3.7 Summary of Encryption; 3.8 SSL (Secure Socket Layer); 3.9 PGP and GPG; 3.10 RSA Challenge; 3.11 Problems; 3.12 Solutions; 4 The Fundamentals of Modern Cryptography; 4.1 Encryption Revisited; 4.2 Block Ciphers, Shannon's Confusion and Diffusion; 4.3 Perfect Secrecy, Stream Ciphers, One-Time Pad

4.4 Hash Functions4.5 Message Integrity Using Symmetric Cryptography; 4.6 General Public Key Cryptosystems; 4.7 Electronic Signatures; 4.8 The Diffie-Hellman Key Exchange; 4.9 Quantum Encryption; 4.10 Key Management and Kerberos; 4.11 DES; 4.12 Problems; 4.13 Solutions; 5 DES, AES and Operating Modes; 5.1 The Data Encryption Standard Code; 5.2 Triple DES; 5.3 DES and Unix; 5.4 The Advanced Encryption Standard Code; 5.5 Problems; 5.6 Solutions; 6 Elliptic Curve Cryptography (ECC); 6.1 Abelian Integrals, Fields, Groups; 6.2 Curves, Cryptography; 6.3 Nonsingularity

6.4 The Hasse Theorem, and an Example6.5 More Examples; 6.6 The Group Law on Elliptic Curves; 6.7 Key Exchange with Elliptic Curves; 6.8 Elliptic Curves mod n; 6.9 Encoding Plain Text; 6.10 Security of ECC; 6.11 More Geometry of Cubic Curves; 6.12 Cubic Curves and Arcs; 6.13 Homogeneous Coordinates; 6.14 Fermat's Last Theorem, Elliptic Curves, Gerhard Frey; 6.15 Problems; 6.16 Solutions; 7 Attacks in Cryptography; 7.1 Cryptanalysis; 7.2 Soft Attacks; 7.3 Brute Force Attacks; 7.4 Man-In-The-Middle Attacks; 7.5 Known Plain Text Attacks; 7.6 Known Cipher Text Attacks

7.7 Chosen Plain Text Attacks7.8 Chosen Cipher Text Attacks, Digital Signatures; 7.9 Replay Attacks; 7.10 Birthday Attacks; 7.11 Birthday Attack on Digital Signatures; 7.12 Birthday Attack on the Discrete Log Problem; 7.13 Attacks on RSA; 7.14 Attacks on RSA using Low-Exponents; 7.15 Timing Attack; 7.16 Differential Cryptanalysis; 7.17 Implementation Errors and Unforeseen States; 8 Practical Issus; 8.1 Introduction; 8.2 Hot Issues; 8.3 Authentication; 8.4 E-Commerce; 8.5 E-Government; 8.6 Key Lengths; 8.7 Digital Rights; 8.8 Wireless Networks; 8.9 Communication Protocols

II Information Theory

Discover the first unified treatment of today's most essential information technologies- Compressing, Encrypting, and Encoding With identity theft, cybercrime, and digital file sharing proliferating in today's wired world, providing safe and accurate information transfers has become a paramount concern. The issues and problems raised in this endeavor are encompassed within three disciplines: cryptography, information theory, and error-correction. As technology continues to develop, these fields have converged at a practical level, increasing the need for a unified treatment of these three co