Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Konheim A.G. — Computer Security and Cryptography
Konheim A.G. — Computer Security and Cryptography



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: Computer Security and Cryptography

Автор: Konheim A.G.

Аннотация:

Gain the skills and knowledge needed to create effective data security systems


This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.

Three basic types of chapters are featured to facilitate learning:
Chapters that develop technical skills
Chapters that describe a cryptosystem and present a method of analysis
Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions

With consumers becoming increasingly waryof identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.


Язык: en

Рубрика: Computer science/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Издание: 1st edition

Год издания: 2006

Количество страниц: 544

Добавлена в каталог: 11.12.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
Secure socket layer (SSL), transaction, key exchange protocol of, anonymous fixed Diffie — Hellman      500
Secure socket layer (SSL), transaction, key exchange protocol of, anonymous RSA      500
SEEK cryptosystem      450—451
Shamir, Adi      340 358—362 378 451 476—478
Shannon, Claude (1916—2001)      5 16 18
Shannon, Claude (1916—2001), confusion or substitution      18
Shannon, Claude (1916—2001), diffusion or transposition      18
Shor, Peter W.      428
Side information      6
Sieving      390
SIGINT (Signals Intelligence)      9
Sinkov, Dr. Abraham (1907—1998)      12
smart cards      491—493
Smart cards, external interface of      492—493
Smart cards, functionality of      493
Smart cards, ISO standards for      491—492
Smart cards, memory of      492
Smart cards, processing capability      493
Spoofing      448—449
Stambler, Leon      514—515
Stambler, Leon, infringement: Diebold Incorporated, NCR; Corporation and Manufacturers Hanover; Trust vs.      514
Stambler, Leon, infringement: RSA and VeriSign vs.      514—515
Stambler, Leon, U.S. Patent No. 5, 793, 302      514
Stambler, Leon, U.S. Patent No. 5, 936, 541      514
Stambler, Leon, U.S. Patent No. 5, 974, 148      515
Statistical plaintext language source      30
Steganography      9
Stream ciphers      245
Stream encipherment      245
Strong pseudoprime to the base a      405
Threats to network transactions      465
Threats to network transactions, spoofing      448—449
TRAnsactions in a SECure manner (TRASEC)      494—495
TRAnsactions in a SECure manner (TRASEC), authentication scheme for      494
Trapdoor knapsack problem, cryptanalysis of      358—370
Trapdoor knapsack problem, encipherment/decipherment of ASCII-Plaintext      355—358
Trapdoor knapsack problem, information rate of      354
Trapdoor knapsack problem, Merkle — Hellman      350—358
Trapdoor knapsack problem, modular mapping of      358—360
Trapdoor knapsack problem, modulus of      350
Trapdoor knapsack problem, multiplier in      350
Trusted authority      335
U.S. Patent No. 3, 543, 904      509—510
U.S. Patent No. 4, 200, 770      448—449 511—512
U.S. Patent No. 4, 200, 770, infringement: National Cash Register Corporation vs. Chubb Integrated Systems      510—511
U.S. Patent No. 4, 218, 582      512
U.S. Patent No. 4, 405, 829      513
U.S. Patent No. 4, 405, 829, infringement: Public Key Partners vs. RSA Data Security Incorporated      514
U.S. Patent No. 4, 405, 829, PKS/RSADI litigation      514
United States Armed Forces Security Agency      130
United States Patent Office classification code      507
UNIX password      480—481
User identifier      335
User secret key      335
VENONA (aka BRIDE, DRUG)      128—132
VENONA (aka BRIDE, DRUG) and Julius Rosenberg (aka LIBERAL)      132
VeriSign      514
Vernam, Gilbert S. (1890—1960)      117—118
Vigene`re tableaux      117
Williamson, Malcolm J. (1931—2003)      342
Wire code-wheel      150
Wire-tapper      465
work function      5
X.509 certificates      493—497
X.509 certificates, advantages of      496
X.509 certificates, certificate authority (CA), issuance by      496 503—505
X.509 certificates, example of      497
X.509 certificates, structure of      496—497
X9.17 protocol      453—456
X9.17 protocol, data key      453
X9.17 protocol, distribution of      455
X9.17 protocol, hierarchy of keys of      453
X9.17 protocol, key encrypting key      453
X9.17 protocol, key exchange architecture      453—455
X9.17 protocol, protocol mechanisms      455—456
1 2 3
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте