Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen

Чтение книги онлайн.

Читать онлайн книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen страница 1

Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen

Скачать книгу

tion id="u8c9d1166-927a-5466-94fa-bf4e5aef45a7">

      

      Table of Contents

      1  Cover

      2  Series Page

      3  Title Page

      4  Copyright

      5  Dedications

      6  Preface to the Second Edition WELCOME, New Co‐author Intended Readership, Connections Between the Areas Problems with Solutions Style Possible Courses What's New Hardcover and eBook

      7  Acknowledgments for the Second Edition

      8  Book Website

      9  About the Authors

      10  Part I: Mainly Cryptography Chapter 1: Historical Introduction and the Life and Work of Claude E. Shannon 1.1 Historical Background 1.2 Brief Biography of Claude E. Shannon 1.3 Career 1.4 Personal – Professional 1.5 Scientific Legacy 1.6 The Data Encryption Standard Code, DES, 1977–2005 1.7 Post‐Shannon Developments Notes Chapter 2: Classical Ciphers and Their Cryptanalysis 2.1 Introduction 2.2 The Caesar Cipher 2.3 The Scytale Cipher 2.4 The Vigenère Cipher 2.5 Frequency Analysis 2.6 Breaking the Vigenère Cipher, Babbage–Kasiski 2.7 The Enigma Machine and Its Mathematics 2.8 Modern Enciphering Systems 2.9 Problems 2.10 Solutions Chapter 3: RSA, Key Searches, TLS, and Encrypting Email 3.1 The Basic Idea of Cryptography 3.2 Public Key Cryptography and RSA on a Calculator 3.3 The General RSA Algorithm 3.4 Public Key Versus Symmetric Key 3.5 Attacks, Security, Catch‐22 of Cryptography 3.6 Summary of Encryption 3.7 The Diffie–Hellman Key Exchange 3.8 Intruder‐in‐the‐Middle Attack on the Diffie–Hellman (or Elliptic Curve) Key‐Exchange 3.9 TLS (Transport Layer Security) 3.10 PGP and GPG 3.11 Problems 3.12 Solutions Notes Chapter 4: The Fundamentals of Modern Cryptography 4.1 Encryption Revisited 4.2 Block Ciphers, Shannon's Confusion and Diffusion 4.3 Perfect Secrecy, Stream Ciphers, One‐Time Pad 4.4 Hash Functions 4.5 Message Integrity Using Symmetric Cryptography 4.6 General Public Key Cryptosystems 4.7 Digital Signatures 4.8 Modifying Encrypted Data and Homomorphic Encryption 4.9 Quantum Encryption Using Polarized Photons 4.10 Quantum Encryption Using Entanglement 4.11 Quantum Key Distribution is Not a Silver Bullet 4.12 Postquantum Cryptography 4.13 Key Management and Kerberos 4.14 Problems 4.15 Solutions Chapter 5: Modes of Operation for AES and Symmetric Algorithms 5.1 Modes of Operation 5.2

Скачать книгу