# Cryptography Demystified

### John Hershey

• 出版商:
• 出版日期: 2002-09-13
• 售價: \$2,210
• 貴賓價: 9.5\$2,100
• 語言: 英文
• 頁數: 356
• 裝訂: Paperback
• ISBN: 0071406387
• ISBN-13: 9780071406383
• 相關分類:
• 海外代購書籍(需單獨結帳)

## 商品描述

AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY

Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basics—but dread the thick tomes that are your only other option—help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package that’s actually fun to use.

You must read this book if—

* You prefer your simplifications from an expert who understands the complexities

* 6 years of success as a short course for students and professionals works for you

* you enjoy hearing the phrase “nothing to memorize”

* ecommerce, email, network security, or wireless communications is part of your bailiwick

* cracking cryptography means a jump up the career ladder

* the words “public-key cryptography,” “channel-based cryptography,” and “prime numbers” pique your interest

* best-practices cryptography is the only secure way for you—and your company—to go

One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutorial—the first to make the basics of the science truly accessible.

Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY
Module 1 First Considerations
Exercise 1
Module 2 Plaintext
Exercise 2
Module 3 Digitization of Plaintext
Exercise 3
Module 4 Toward a Cryptographic Paradigm
Exercise 4
Module 5 What We Want from the Keytext
Exercise 5
Module 6 Randomness I
Exercise 6
Module 7 Finite State Sequential Machines
Exercise 7 Transition Matrix
Module 8 m-sequences
Exercise 8
Module 9 The Paradigm Attempted
Exercise 9
Module 10 The Block Cipher Function - A Modern Keystone
Exercise 10
Module 11 Confidentiality Modes: ECB and CTR
Exercise 11
Module 12 Confidentiality Mode: Output Feedback (OFB)
Exercise 12
Module 13 Confidentiality Modes: Cipher Feedback (CFB)
and Cipher Block Chaining (CBC)
Exercise 13
Part II NUMBER THEORY WE WILL NEED
Module 14 Prime Numbers I
Exercise 14
Module 15 Congruences
Exercise 15
Module 16 Euler-Fermat Theorem
Exercise 16
Module 17 The Euler Phi (f) Function
Exercise 17
Module 18 The Binary Exponentiation Algorithm
Exercise 18
Module 19 The Extended Euclidean Algorithm
Exercise 19
Module 20 Primitive Roots
Exercise 20
Module 21 Chinese Remainder Theorem
Exercise 21
Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY
Module 22 Merkles Puzzle
Exercise 22
Module 23 The Diffie-Hellman Public Key Cryptographic System
Exercise 23
Module 24 Split Search
Exercise 24
Module 25 A Variant of the Diffie-Hellman System
Exercise 25
Module 26 The RSA Public Key Cryptographic System
Exercise 26
Module 27 Prime Numbers II
Exercise 27
Part IV KEYING VARIABLES
Module 28 Keying Variable Distribution
Exercise 28
Module 29 Secret Sharing
Exercise 29
Module 30 Randomness II
Exercise 30
Module 31 Cryptovariables
Exercise 31
Part V CRYPTO-OBSOLESCENCE
Module 32 The Aging Cryptoalgorithm
Exercise 32
Module 33 SUPERDES(tm