Introduction to cryptography with coding theory / by Wade Trappe and Lawrence C. Washington

By: Trappe, WadeContributor(s): Washington, Lawrence CMaterial type: TextTextPublication details: New Delhi : Pearson Education Private Limited, 2011, 2006cDescription: xiv, 577 p. : ill. ; 25 cmISBN: 9788131714768 (pbk)Subject(s): Coding theory | CryptographyDDC classification: 005.82
Contents:
1: Overview of Cryptography and Its Applications. Secure Communications ; Cryptographic Applications -- 2: Classical Cryptosystems. Shift Ciphers ; Affine Ciphers ; The Vigenere Cipher ; Substitution Ciphers ; Sherlock Holmes ; The Playfair and ADFGX Ciphers ; Block Ciphers ; Binary Numbers and ASCII ; One-Time Pads ; Pseudo-random Bit Generation ; LFSR Sequences ; Enigma ; Exercises ; Computer Problems -- 3: Basic Number Theory. Basic Notions ; Solving ax + by = d ; Congruences ; The Chinese Remainder Theorem ; Modular Exponentiation ; Fermat and Euler ; Primitive Roots ; Inverting Matrices Mod n ; Square Roots Mod n ; Legendre and Jacobi Symbols ; Finite Fields ; Continued Fractions ; Exercises ; Computer Problems -- 4: The Data Encryption Standard. A Simplified DES-Type Algorithm ; Differential Cryptanalysis ; DES ; Modes of Operation ; Breaking DES ; Meet-in-the-Middle Attacks ; Password Security ; Exercises ; Computer Problems -- 5: The Advanced Encryption Standard : Rijndael. The Basic Algorithm ; The Layers ; Decryption ; Design Considerations ; Exercises -- 6: The RSA Algorithm. The RSA Algorithm ; Attacks on RSA ; Primality Testing ; Factoring ; The RSA Challenge ; An Application to Treaty Verification ; The Public Key Concept ; Exercises ; Computer Problems -- 7: Discrete Logarithms. Discrete Logarithms ; Computing Discrete Logs ; Bit Commitment ; Diffie-Hellman Key Exchange ; The ElGamal Public Key Cryptosystem ; Exercises ; Computer Problems -- 8: Hash Functions. Hash Functions ; A Simple Hash Example ; The Secure Hash Algorithm ; Birthday Attacks ; Multicollisions ; The Random Oracle Model ; Using Hash Functions to Encrypt ; Exercises ; Computer Problems -- 9: Digital Signatures. RSA Signatures ; The ElGamal Signature Scheme ; Hashing and Signing ; Birthday Attacks on Signatures ; The Digital Signature Algorithm ; Exercises ; Computer Problems -- 10: Security Protocols. Intruders-in-the-Middle and Impostors ; Key Distribution ; Kerberos ; Public Key Infrastructures (PKI) ; X.509 Certificates ; Pretty Good Privacy ; SSL and TLS ; Secure Electronic Transaction ; Exercises -- 11: Digital Cash. Digital Cash ; Exercises -- 12: Secret Sharing Schemes. Secret Splitting ; Threshold Schemes ; Exercises ; Computer Problems -- 13: Games. Flipping Coins over the Telephone ; Poker over the Telephone ; Exercises -- 14: Zero-Knowledge Techniques. The Basic Setup ; The Feige-Fiat-Shamir Identification Scheme ; Exercises -- 15: Information Theory. Probability Review ; Entropy ; Huffman Codes ; Perfect Secrecy ; The Entropy of English ; Exercises -- 16: Elliptic Curves. The Addition Law ; Elliptic Curves Mod p ; Factoring with Elliptic Curves ; Elliptic Curves in Characteristic 2 ; Elliptic Curve Cryptosystems ; Identity-Based Encryption ; Exercises ; Computer Problems -- 17: Lattice Methods. Lattices ; Lattice Reduction ; An Attack on RSA ; NTRU ; Exercises -- 18: Error Correcting Codes. Introduction ; Error Correcting Codes ; Bounds on General Codes ; Linear Codes ; Hamming Codes ; Golay Codes ; Cyclic Codes ; BCH Codes ; Reed-Solomon Codes ; The McEliece Cryptosystem ; Other Topics ; Exercises ; Computer Problems -- 19: Quantum Techniques in Cryptography. A Quantum Experiment ; Quantum Key Distribution ; Shor's Algorithm ; Exercises -- A Mathematica Examples -- B Maple Examples -- C Matlab Examples.
Summary: This text is for a course in cryptography for advanced undergraduate and graduate students. Material is accessible to mathematically mature students having little background in number theory and computer programming. Core material is treated in the first eight chapters on areas such as classical cryptosystems, basic number theory, the RSA algorithm, and digital signatures. The remaining nine chapters cover optional Read more...
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
Books Books Namal Library
Computer Science
005.82 TRA-I 2011 4213 (Browse shelf (Opens below)) 2 Available 0004213
Total holds: 0
Browsing Namal Library shelves, Shelving location: Computer Science Close shelf browser (Hides shelf browser)
005.82 SCH-P 2006 2080 Practical cryptography / 005.82 SCH-P 2006 783 Practical cryptography / 005.82 SHY-C 2011 1244 Cryptography and security / 005.82 TRA-I 2011 4213 Introduction to cryptography with coding theory / 005.82 TRA-I 2011 647 Introduction to cryptography with coding theory / 005.82 WOB-C 2007 1228 Cryptology unlocked / 005.84 GUP-V 2010 2652 Virtual instrumentation using Labview /

Index included

1: Overview of Cryptography and Its Applications. Secure Communications ; Cryptographic Applications -- 2: Classical Cryptosystems. Shift Ciphers ; Affine Ciphers ; The Vigenere Cipher ; Substitution Ciphers ; Sherlock Holmes ; The Playfair and ADFGX Ciphers ; Block Ciphers ; Binary Numbers and ASCII ; One-Time Pads ; Pseudo-random Bit Generation ; LFSR Sequences ; Enigma ; Exercises ; Computer Problems -- 3: Basic Number Theory. Basic Notions ; Solving ax + by = d ; Congruences ; The Chinese Remainder Theorem ; Modular Exponentiation ; Fermat and Euler ; Primitive Roots ; Inverting Matrices Mod n ; Square Roots Mod n ; Legendre and Jacobi Symbols ; Finite Fields ; Continued Fractions ; Exercises ; Computer Problems -- 4: The Data Encryption Standard. A Simplified DES-Type Algorithm ; Differential Cryptanalysis ; DES ; Modes of Operation ; Breaking DES ; Meet-in-the-Middle Attacks ; Password Security ; Exercises ; Computer Problems -- 5: The Advanced Encryption Standard : Rijndael. The Basic Algorithm ; The Layers ; Decryption ; Design Considerations ; Exercises -- 6: The RSA Algorithm. The RSA Algorithm ; Attacks on RSA ; Primality Testing ; Factoring ; The RSA Challenge ; An Application to Treaty Verification ; The Public Key Concept ; Exercises ; Computer Problems -- 7: Discrete Logarithms. Discrete Logarithms ; Computing Discrete Logs ; Bit Commitment ; Diffie-Hellman Key Exchange ; The ElGamal Public Key Cryptosystem ; Exercises ; Computer Problems -- 8: Hash Functions. Hash Functions ; A Simple Hash Example ; The Secure Hash Algorithm ; Birthday Attacks ; Multicollisions ; The Random Oracle Model ; Using Hash Functions to Encrypt ; Exercises ; Computer Problems -- 9: Digital Signatures. RSA Signatures ; The ElGamal Signature Scheme ; Hashing and Signing ; Birthday Attacks on Signatures ; The Digital Signature Algorithm ; Exercises ; Computer Problems -- 10: Security Protocols. Intruders-in-the-Middle and Impostors ; Key Distribution ; Kerberos ; Public Key Infrastructures (PKI) ; X.509 Certificates ; Pretty Good Privacy ; SSL and TLS ; Secure Electronic Transaction ; Exercises -- 11: Digital Cash. Digital Cash ; Exercises -- 12: Secret Sharing Schemes. Secret Splitting ; Threshold Schemes ; Exercises ; Computer Problems -- 13: Games. Flipping Coins over the Telephone ; Poker over the Telephone ; Exercises -- 14: Zero-Knowledge Techniques. The Basic Setup ; The Feige-Fiat-Shamir Identification Scheme ; Exercises -- 15: Information Theory. Probability Review ; Entropy ; Huffman Codes ; Perfect Secrecy ; The Entropy of English ; Exercises -- 16: Elliptic Curves. The Addition Law ; Elliptic Curves Mod p ; Factoring with Elliptic Curves ; Elliptic Curves in Characteristic 2 ; Elliptic Curve Cryptosystems ; Identity-Based Encryption ; Exercises ; Computer Problems -- 17: Lattice Methods. Lattices ; Lattice Reduction ; An Attack on RSA ; NTRU ; Exercises -- 18: Error Correcting Codes. Introduction ; Error Correcting Codes ; Bounds on General Codes ; Linear Codes ; Hamming Codes ; Golay Codes ; Cyclic Codes ; BCH Codes ; Reed-Solomon Codes ; The McEliece Cryptosystem ; Other Topics ; Exercises ; Computer Problems -- 19: Quantum Techniques in Cryptography. A Quantum Experiment ; Quantum Key Distribution ; Shor's Algorithm ; Exercises -- A Mathematica Examples -- B Maple Examples -- C Matlab Examples.

This text is for a course in cryptography for advanced undergraduate and graduate students. Material is accessible to mathematically mature students having little background in number theory and computer programming. Core material is treated in the first eight chapters on areas such as classical cryptosystems, basic number theory, the RSA algorithm, and digital signatures. The remaining nine chapters cover optional Read more...

There are no comments on this title.

to post a comment.