Жанры
Авторы
Контакты
О сайте
Книжные новинки
Популярные книги
Найти
Главная
Авторы
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction
Читать книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen - Страница 1
Оглавление
Предыдущая
Следующая
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
...
87
Оглавление
Купить и скачать книгу
Вернуться на страницу книги Cryptography, Information Theory, and Error-Correction
Оглавление
Страница 1
Table of Contents
List of Tables
List of Illustrations
Guide
Pages
SERIES PAGE TITLE
Cryptography, Information Theory and Error-Correction
A Handbook for the 21st Century
Страница 9
Dedications
Страница 11
Acknowledgments for the Second Edition
Book Website
About the Authors
Страница 15
Chapter 1 Historical Introduction and the Life and Work of Claude E. Shannon
1.1 Historical Background
1.2 Brief Biography of Claude E. Shannon
1.3 Career
1.4 Personal – Professional
1.5 Scientific Legacy Circuits
Cryptography
1.6 The Data Encryption Standard Code, DES, 1977–2005
1.7 Post‐Shannon Developments Cybersecurity
Big data
Memory (RAM)
Central processing unit (CPU) and graphics processing unit (GPU)
Moore's law
Artificial intelligence (AI)
Smart phones
Streaming – video and audio
Social media
Cloud computing
Internet of Things (IoT)
Privacy concerns
Security and privacy
Cryptography
Postquantum cryptography
Blockchains
Notes
Chapter 2 Classical Ciphers and Their Cryptanalysis
2.1 Introduction
2.2 The Caesar Cipher
2.3 The Scytale Cipher
2.4 The Vigenère Cipher
2.5 Frequency Analysis
2.6 Breaking the Vigenère Cipher, Babbage–Kasiski
The Babbage–Kasiski method
The method of coincidences
Remark
Finding the keyword
Remark
2.7 The Enigma Machine and Its Mathematics
2.8 Modern Enciphering Systems
2.9 Problems
2.10 Solutions
Chapter 3 RSA, Key Searches, TLS, and Encrypting Email
3.1 The Basic Idea of Cryptography
3.2 Public Key Cryptography and RSA on a Calculator
Question
Remark 3.1
3.3 The General RSA Algorithm
The RSA Algorithm.
Remark 3.2
Remark 3.3
Another example of the RSA algorithm
Remark 3.4
Remark 3.5
3.4 Public Key Versus Symmetric Key
3.5 Attacks, Security, Catch‐22 of Cryptography
Theorem 3.6
3.6 Summary of Encryption
3.7 The Diffie–Hellman Key Exchange
An example with a small prime
Diffie–Hellman problem
Discrete log problem
El Gamal Cryptosystem
The El Gamal digital signature scheme
3.8 Intruder‐in‐the‐Middle Attack on the Diffie–Hellman (or Elliptic Curve) Key‐Exchange
3.9 TLS (Transport Layer Security)
3.10 PGP and GPG
Encrypting/decrypting
Signing/authenticating
3.11 Problems
3.12 Solutions
Notes
{buyButton}
Подняться наверх