Ãëàâíàÿ    Ex Libris    Êíèãè    Æóðíàëû    Ñòàòüè    Ñåðèè    Êàòàëîã    Wanted    Çàãðóçêà    ÕóäËèò    Ñïðàâêà    Ïîèñê ïî èíäåêñàì    Ïîèñê    Ôîðóì   
blank
Àâòîðèçàöèÿ

       
blank
Ïîèñê ïî óêàçàòåëÿì

blank
blank
blank
Êðàñîòà
blank
Konheim A.G. — Computer Security and Cryptography
Konheim A.G. — Computer Security and Cryptography



Îáñóäèòå êíèãó íà íàó÷íîì ôîðóìå



Íàøëè îïå÷àòêó?
Âûäåëèòå åå ìûøêîé è íàæìèòå Ctrl+Enter


Íàçâàíèå: Computer Security and Cryptography

Àâòîð: Konheim A.G.

Àííîòàöèÿ:

Gain the skills and knowledge needed to create effective data security systems


This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.

Three basic types of chapters are featured to facilitate learning:
Chapters that develop technical skills
Chapters that describe a cryptosystem and present a method of analysis
Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions

With consumers becoming increasingly waryof identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.


ßçûê: en

Ðóáðèêà: Computer science/

Ñòàòóñ ïðåäìåòíîãî óêàçàòåëÿ: Ãîòîâ óêàçàòåëü ñ íîìåðàìè ñòðàíèö

ed2k: ed2k stats

Èçäàíèå: 1st edition

Ãîä èçäàíèÿ: 2006

Êîëè÷åñòâî ñòðàíèö: 544

Äîáàâëåíà â êàòàëîã: 11.12.2007

Îïåðàöèè: Ïîëîæèòü íà ïîëêó | Ñêîïèðîâàòü ññûëêó äëÿ ôîðóìà | Ñêîïèðîâàòü ID
blank
Ïðåäìåòíûé óêàçàòåëü
$\chi$-value      157—158
$\chi^2$-test of hypothesis      67
Absolute secrecy      17
Access control      2
Adelman, Len      340—341 378
ADFGVX encipherment      47 48
Alphabet      1
ANSI Standard X9.1—1980      489—491
ANSI Standard X9.1—1980, track 3 format of      490
ATM transaction(s)      489—490
ATM transaction(s), Atalla Technovations, implementation by      488—489
ATM transaction(s), ATM authentication protocol of      489
ATM transaction(s), Chubb Integrated Systems, ATM authentication protocol of      484—487
ATM transaction(s), Chubb Integrated Systems, implementation by      487 510—511
ATM transaction(s), IBM Liberty banking system, Bond — Zelinski, PIN attack by      488—489
ATM transaction(s), IBM Liberty banking system, common cryptographic architecture, program, IBM      487
ATM transaction(s), IBM Liberty banking system, decimalization table      487
ATM transaction(s), IBM Liberty banking system, implementation in      487
ATM transaction(s), PAN—PIN table      485
ATM transaction(s), personal identification number (PIN)      484—487
ATM transaction(s), personal identification number, PAN(User_ID), PIN(User_ID), PINOffset(User_ ID), U-PIN(User_ID)      487
ATM transaction(s), primary account number (PAN)      484
Authentication      2—3 464—466
Authentication in GSM      276
automated teller machine (ATM)      484
Automated teller machine (ATM), customer authentication at a      484—487
Automated teller machine (ATM), on/off-line operation of      486
Baby-step, giant-step algorithm (Shank's)      420
BART system: The Case of the Larcenous Laundry      484
BART system: Wattenberg, Dr. Bill      483
Baudot code      118
Baum, Leonard      78 81 85
Bent functions      327
Berlekamp's algorithm      399—400
Bezout's theorem      431
Birthday paradox      395
Block ciphers      283
Block ciphers, (a) class of      329—332
Block ciphers, IDEA      332
Block ciphers, nonlinearity of      326—327
Block ciphers, nonlinearity of, Nyberg's criteria for      327
Block ciphers, nonlinearity of, Pierpryzk's criteria for      326—327
Block ciphers, product      283—322
Block ciphers, secure      326—327
Block ciphers, which generate the symmetric group      327—329
Bombe (fr.)      8 166 168
Book cipher      11 116
Caesar's cipher (substitution)      65
Caesar's cipher (substitution), (affine) Caesar cipher (substitution)      65
Caesar's cipher (substitution), Caesar shift      65
Captain Midnight's decoding badge      64—65
Carmichael numbers      377 405
Carmichael numbers, properties of      405
Certicom      16 445
Certicom, challenge      445
certificates      341—342 495—499 502—505
Certificates, public key      495—497
Certificates, public key, certificate authority (CA), issuance by      496 503—505
Certificates, public key, certificate hierarchies      503—505
Certificates, public key, Certification Authorities (CA) (Level 3)      503—505
Certificates, public key, interaction of      503—505
Certificates, public key, Internet Policy Registration Authority (IPRA) (Level 1)      503—505
Certificates, public key, Policy Certification Authorities (PCA) (Level 2)      503—505
Certificates, public key, X.509      495—497
Certificates, public key, X.509, example of      497
Certificates, public key, X.509, structure of      496—497
Chinese remainder theorem      400—401
Chosen plaintext attack      6
Ciphertext      2
Ciphertext, alphabet(s)      153 218 223
Ciphertext, cryptanalysis with (ciphertext) only      6
Cocks, Clifford C.      342
Coincidence      124—126
Coincidence, estimating the period of periodic polyalphabetic substitution using      126—127
Columnar transposition encipherment      18
Columnar transposition encipherment, based on a grille      49 50
Columnar transposition encipherment, examples of      25
Columnar transposition encipherment, invertibility of      19
Columnar transposition encipherment, size of key space      20
Columnar transposition encipherment, testing possible widths      25
Communications Intelligence (COMINT)      9
Communications Security (COMSEC)      9
complexity      338
Composite number      405—407
Composite number, integer factorization, problem of      405 468
Computer Electronics Security Group (CESG)      342—343
Conjugacy      155
Conjugacy, characteristic property of      155
Continued fraction algorithm      365—366
Continued fraction algorithm, convergents of      365
Corresponding plain- and ciphertext attack      6
Counting k-grams (of text)      33
Counting k-grams (of text), jumping window      33
Counting k-grams (of text), sliding window      33
Crib      21
Crib, subcribs      21
Crib, subcribs, complete set of      24
Cribbing      21
Cribbing, examples of      25—30
Cribbing, using isomorphs for      66
Cryptanalysis      4 6
Cryptanalysis, Kerckhoffs' principles of      4
CRYPTO 'N      15 358
Cryptographic salt      480—481
Cryptographic system(s)      4 12
Cryptosystem      4
Cryptosystem, knapsack-like      371
Cryptosystem, weaknesses in a      136
Data Encryption Standard (DES)      288—311
Data Encryption Standard (DES), chaining in      295—297
Data Encryption Standard (DES), components of initial permutation (IP)      292
Data Encryption Standard (DES), components of key schedule (PC-1, PC-3, KS)      292—293
Data Encryption Standard (DES), components of P-box      292
Data Encryption Standard (DES), components of S-box(es)      289—292
Data Encryption Standard (DES), cryptanalysis of      300—309
Data Encryption Standard (DES), DES-cracker      308—310
Data Encryption Standard (DES), DES-cracker, architecture of      309
Data Encryption Standard (DES), DES-cracker, key search algorithm of      309—310
Data Encryption Standard (DES), DES-cracker, operation of      310
Data Encryption Standard (DES), differential cryptanalysis of      302—309
Data Encryption Standard (DES), export of      309—311
Data Encryption Standard (DES), initial seed in      299
Data Encryption Standard (DES), Matsui's linear cryptanalysis of      302
Data Encryption Standard (DES), output-feedback mode (OFB) of      299—300
Data Encryption Standard (DES), randomness of      297—299
Data Encryption Standard (DES), sample encipherment of      296
Data Encryption Standard (DES), semi-weak keys of      294
Data Encryption Standard (DES), weak keys of      293—294
de Vigenere, Blaise (1523—1596)      117
Decipherment      2
decryption      2
Diagnosis      139—149
Diffie — Hellman key-exchange      448—450
Diffie — Hellman key-exchange, El Gamal's extension of      450—451
Diffie, Whittfield      334 337 339—340
Digital signature system(s)      467—470
Digital signature system(s), El Gamal's signature protocol      475
Digital signature system(s), MD5      471—473
Digital signature system(s), NIST's digital signature algorithm      474—475
Digital signature system(s), public key cryptography and      467—468
Digital signature system(s), Rabin's quadratic residue      468—470
Digital signature system(s), TRAnsactions in a SECure manner (TRASEC)      494—495
Digital signature system(s), TRAnsactions in a SECure manner (TRASEC), authentication scheme in      494
Digital signature(s) (SIG)      3 337 465—470
Digital signature(s) (SIG), desiderata of      466
Digital signature(s) (SIG), message digest      470—471
Digital signature(s) (SIG), using elliptic curve cryptosystems      444—445
Diophantine approximation      364
Diophantine approximation, simultaneous      366—370
Diophantine approximation, simultaneous, unusually good (UGSDA)      367—370
Diophantine equations      364
Diophantus of Alexandria (c. 200/214 — c. 284/298)      364
Dirichlet L-series      407
Discrete logarithm problem (DLP)      16 414—426
Discrete logarithm problem (DLP), Adelman's subexponential algorithm for      419
Discrete logarithm problem (DLP), current state of research on      428
Discrete logarithm problem (DLP), in a group      414 420—426
Discrete logarithm problem (DLP), modulo p      414—419
Discrete logarithm problem (DLP), Pohlig — Hellman's solution of      415—418
Discrete logarithm problem (DLP), solution by index-calculus method      422—424
Display of plain- and ciphertext, convention on      20
Division algorithm for integers      346
Division algorithm for polynomials      247—248
Doctrine of equitable estoppel      514
Electronic commerce (e-commerce)      334 336—337
Electronic purse (electronic wallet)      493
Elliptic curve cryptosystem(s)      443—445
Elliptic curve cryptosystem(s), digital signature system for      444—445
Elliptic curve cryptosystem(s), integrated encryption standard (ECIEC)      444
Elliptic curve cryptosystem(s), NSA's case for      445
Elliptic curve(s)      429
Elliptic curve(s), Bezout's Theorem for      431
Elliptic curve(s), chord-tangent group law of      431
Elliptic curve(s), Diffie — Hellman key exchange      442
Elliptic curve(s), discriminant of      429
Elliptic curve(s), Lenstra's factorization algorithm on      432
Elliptic curve(s), supersingular      441
Elliptic group over the $Z_p$      434—436
Elliptic group over the field $Z_{m      2}$ 436—437
Elliptic group over the reals      431—432
Elliptic group, computations in the elliptic group $Z_{m      2}(a b)$ 438—441
Ellis, James H.      342
Encipherment      2
Encryption      2
Engima machine      7 160—170
Engima machine, components of      160
Engima machine, cryptanalysis of Enigma by Rejewski, Marian (1903—1990)      166
Engima machine, cryptanalysis of Enigma by Rozycki, Jerzy (1909—1942)      166
Engima machine, cryptanalysis of Enigma by Welchman, Gordon (1906—1985)      166—167
Engima machine, cryptanalysis of Enigma by Zygalski, Henryzk (1906—1978)      166
Engima machine, cryptanalysis of Enigma ciphertext      166—170
Engima machine, cryptanalysis of Enigma ciphertext, by cribbing      167—170
Engima machine, cryptanalysis of Enigma ciphertext, using double-ended Enigmas      168—170
Engima machine, encipherment equation of the      165—166
Engima machine, key distribution protocol for the      163—164
Engima machine, message indicator, indicator setting, and discriminant of Enigma ciphertext      164—165
Engima machine, plugboard of the      162—163
Engima machine, reflecting rotor (stator)      161—163
Eratosthenes (276BC — 194BC)      390—391
Eratosthenes, measurement of earth's circumference      390—391
Eratosthenes, sieve of      390—393
Euclidean algorithm      348—350
Euclidean algorithm for polynomials      398—399
Euler totient function f(n)      350
Euler's theorem      378
Expectation method (EM)      81
Extension field      421 426—428
Facility keyed-access cards (IBM Series/1)      491
Facility keyed-access cards (IBM Series/1), cryptographic algorithm for      329—330 491
Factorization of integers      339 391 393—394
Factorization of integers, Pollard's r-algorithm for      394—396
Feedback shift register (FSR)      245
Feige, Uriel      477
Feistel, Horst (1915—1990)      283
Fermat witness      405
Fermat's little theorem      377 397
Fermat's primality test      405
Fiat — Shamir identification scheme      477—478
Fiat — Shamir signature scheme      476—477
Fiat, Amos      476—478
Field      10 347 414
Floyd's cycle detecting algorithm      395—396 424
Floyd, Robert W. (1936—2001)      395—396 424
Friedman, William F. (1891—1969)      10 11 63 126—127
Future Advanced Data Encryption Standard      312
Future Advanced Data Encryption Standard, requirements of      312
Gardner, Martin      16 408
Gardner, Meredith (1912—2002)      130
Gary Miller's theorem      407
Gaussian elimination      91—111
Gaussian elimination for factorization      402—403 408
Gaussian elimination, elementary row and column matrix-transformations      103—106
Gaussian elimination, over the integers modulo m      109
Gaussian elimination, used to solve an overdetermined system      108
Global system for mobile communication (GSM)      274—278
Global System for Mobile Communication (GSM), A5 algorithms in      276—278
Global System for Mobile Communication (GSM), A5 algorithms in, cryptanalysis of      278
Global System for Mobile Communication (GSM), authentication in      275
Global System for Mobile Communication (GSM), secrecy in      276—278
Government Communications Headquarters (GCHQ)      342
Greatest common divisor gcd      347—348 377—378
Greatest common divisor gcd, Euclidean algorithm      348—350 378
Half-rotor      191—193
Half-rotor, slip ring(s) of      192
Hash function(s)      470—474
Hash function(s), collision-resistant      470
Hash function(s), MD5      471—473
Hash function(s), one-way hash      470
Hash function(s), secure hash algorithm, NIST's      473—474
Hashing      480
Hebern, Edward H. (1869—1952)      153—155
Hellman, Martin      334 337 339—340
Hidden Markov model (HMM)      78—90
Hidden Markov model (HMM), Expectation method for the parameters of a      81
Hidden Markov model (HMM), forward-backward recursions (of HMMs)      80
Hidden Markov model (HMM), parameter re-estimation (in the HMM)      80—89
Hidden Markov model (HMM), parameter re-estimation (in the HMM), critical point conditions for      81—89
Hidden Markov model (HMM), parameter re-estimation (in the HMM), Q-function in the      85
Hidden Markov model (HMM), scaling (in the HMM)      89—90
Hill encipherment      90—100
Hill encipherment, cribbing Hill ciphertext      100—102
Hill encipherment, finding the Hill matrix; plain- and ciphertext known      91—100
Hill, Lester (1891—1961)      90
IBM 2984 (Cashing Issuing Terminal)      284—287
IBM 2984 (Cashing Issuing Terminal), encipherment steps in      284
IBM 2984 (Cashing Issuing Terminal), nibbles in      285—286
IBM 2984 (Cashing Issuing Terminal), round transformation T      284—285
IBM Research's DES-Group, Adler, Roy L.      284
IBM Research's DES-Group, Coppersmith, Don      284
IBM Research's DES-Group, Grossman, Edna      284
IBM Research's DES-Group, Hoffman, Alan J.      284
IBM Research's DES-Group, Tuckerman, Bryant (1915—2002)      284
IDEA block cipher      328 332
IEEE 802.11b      280—281
Independent and identically distributed trials (chance experiments)      31
Index-calculus algorithm      422—424
Index-calculus method      420—421
Index-calculus method for $Z_{m      2}$ 422—424
Index-calculus method, factor base in      422
Inequality of the arithmetic and geometric means      41
Infringement      509
Integer factorization, problem of      390 468
International Standards Organization (ISO)      492 497
International Standards Organization (ISO), open systems interconnection model of      497
International Standards Organization (ISO), open systems interconnection model of, computer network architectures (SNA, DNA)      497
International Telegraph Union (ITU)      496
International Telegraph Union (ITU), Comite Consultatif Internationale de Telegraphique et Telephonique (CCITT)      496
Invertible $N\times N$ matrices, number of      100
Isomorphs      66
Isomorphs, pruning from a table of      68—73
Jacobi symbol      384
Jacobi symbol, properties of      384
Japanese PURPLE Machine      210—243
Japanese PURPLE Machine, components of      211—212
Japanese PURPLE Machine, components of, C-steppers      212—216
Japanese PURPLE Machine, components of, consonant banks of      212—214
Japanese PURPLE Machine, components of, stepping switches (steppers)      211
Japanese PURPLE Machine, components of, V-stepper      211—212
Japanese PURPLE Machine, components of, wiper (blade)      211
Japanese PURPLE Machine, cribbing PURPLE, determining the Vowel/Consonant subdivision      220
1 2 3
blank
Ðåêëàìà
blank
blank
HR
@Mail.ru
       © Ýëåêòðîííàÿ áèáëèîòåêà ïîïå÷èòåëüñêîãî ñîâåòà ìåõìàòà ÌÃÓ, 2004-2024
Ýëåêòðîííàÿ áèáëèîòåêà ìåõìàòà ÌÃÓ | Valid HTML 4.01! | Valid CSS! Î ïðîåêòå