| 000 | 00000cam u2200205 a 4500 | |
| 001 | 000045365078 | |
| 005 | 20250728110359 | |
| 008 | 060720s2007 flua b 001 0 eng | |
| 010 | ▼a 2006049639 | |
| 015 | ▼a GBA6A2680 ▼2 bnb | |
| 020 | ▼a 1584886188 (acid-free paper) | |
| 020 | ▼a 9781584886181 (acid-free paper) | |
| 035 | ▼a (KERIS)REF000012720307 | |
| 040 | ▼a DLC ▼c DLC ▼d BAKER ▼d C#P ▼d YDXCP ▼d UKM ▼d DLC ▼d 244002 ▼d 211009 | |
| 050 | 0 0 | ▼a QA268 ▼b .M65 2007 |
| 082 | 0 0 | ▼a 003.54 ▼2 22 |
| 090 | ▼a 003.54 ▼b M726i2 | |
| 100 | 1 | ▼a Mollin, Richard A., ▼d 1947- ▼0 AUTH(211009)171817. |
| 245 | 1 3 | ▼a An introduction to cryptography / ▼c Richard A. Mollin. |
| 250 | ▼a 2nd ed. | |
| 260 | ▼a Boca Raton : ▼b Chapman & Hall/CRC, ▼c c2007. | |
| 300 | ▼a x, 413 p. : ▼b ill. ; ▼c 25 cm. | |
| 440 | 0 | ▼a Discrete mathematics and its applications |
| 504 | ▼a Includes bibliographical references (p. 377-383) and index. | |
| 650 | 0 | ▼a Coding theory ▼v Textbooks. |
소장정보
| No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
|---|---|---|---|---|---|---|---|
| No. 1 | 소장처 세종학술정보원/과학기술실(5층)/ | 청구기호 003.54 M726i2 | 등록번호 151233459 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
책소개
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.
With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies, as well as applications, including login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography.
New to the Second Edition:
Accessible and logically organized, An Introduction to Cryptography, Second Edition is the essential book on the fundamentals of cryptography.
Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.
정보제공 :
목차
Preface
MATHEMATICAL BASICS
Divisibility
Primes, Primality Testing, and Induction
An Introduction to Congruences
Euler, Fermat, and Wilson
Primitive Roots
The Index Calculus and Power Residues
Legendre, Jacobi, & Quadratic Reciprocity
Complexity
CRYPTOGRAPHIC BASICS
Definitions and Illustrations
Classic Ciphers
Stream Ciphers
LFSRs
Modes of Operation
Attacks
DES AND AES
S-DES and DES
AES
PUBLIC-KEY CRYPTOGRAPHY
The Ideas behind PKC
Digital Envelopes and PKCs
RSA
ElGamal
DSA - The DSS
PRIMALITY TESTING
True Primality Tests
Probabilistic Primality Tests
Recognizing Primes
FACTORING
Classical Factorization Methods
The Continued Fraction Algorithm
Pollard's Algorithms
The Quadratic Sieve
The Elliptic Curve Method (ECM)
ELECTRONIC MAIL AND INTERNET SECURITY
History of the Internet and the WWW
Pretty Good Privacy (PGP)
Protocol Layers and SSL
Internetworking and Security - Firewalls
Client-Server Model and Cookies
LEADING-EDGE APPLICATIONS
Login and Network Security
Viruses and Other Infections
Smart Cards
Biometrics
정보제공 :
