Cryptography, Information Theory, and Error-Correction. Aiden A. Bruen
Чтение книги онлайн.
Читать онлайн книгу Cryptography, Information Theory, and Error-Correction - Aiden A. Bruen страница 1
Table of Contents
1 Cover
6 Preface to the Second Edition WELCOME, New Co‐author Intended Readership, Connections Between the Areas Problems with Solutions Style Possible Courses What's New Hardcover and eBook
7 Acknowledgments for the Second Edition
10
Part I: Mainly Cryptography
Chapter 1: Historical Introduction and the Life and Work of Claude E. Shannon
1.1 Historical Background
1.2 Brief Biography of Claude E. Shannon
1.3 Career
1.4 Personal – Professional
1.5 Scientific Legacy
1.6 The Data Encryption Standard Code, DES, 1977–2005
1.7 Post‐Shannon Developments
Notes
Chapter 2: Classical Ciphers and Their Cryptanalysis
2.1 Introduction
2.2 The Caesar Cipher
2.3 The Scytale Cipher
2.4 The Vigenère Cipher
2.5 Frequency Analysis
2.6 Breaking the Vigenère Cipher, Babbage–Kasiski
2.7 The Enigma Machine and Its Mathematics
2.8 Modern Enciphering Systems
2.9 Problems
2.10 Solutions
Chapter 3: RSA, Key Searches, TLS, and Encrypting Email
3.1 The Basic Idea of Cryptography
3.2 Public Key Cryptography and RSA on a Calculator
3.3 The General RSA Algorithm
3.4 Public Key Versus Symmetric Key
3.5 Attacks, Security, Catch‐22 of Cryptography
3.6 Summary of Encryption
3.7 The Diffie–Hellman Key Exchange
3.8 Intruder‐in‐the‐Middle Attack on the Diffie–Hellman (or Elliptic Curve) Key‐Exchange
3.9 TLS (Transport Layer Security)
3.10 PGP and GPG
3.11 Problems
3.12 Solutions
Notes
Chapter 4: The Fundamentals of Modern Cryptography
4.1 Encryption Revisited
4.2 Block Ciphers, Shannon's Confusion and Diffusion
4.3 Perfect Secrecy, Stream Ciphers, One‐Time Pad
4.4 Hash Functions
4.5 Message Integrity Using Symmetric Cryptography
4.6 General Public Key Cryptosystems
4.7 Digital Signatures
4.8 Modifying Encrypted Data and Homomorphic Encryption
4.9 Quantum Encryption Using Polarized Photons
4.10 Quantum Encryption Using Entanglement
4.11 Quantum Key Distribution is Not a Silver Bullet
4.12 Postquantum Cryptography
4.13 Key Management and Kerberos
4.14 Problems
4.15 Solutions
Chapter 5: Modes of Operation for AES and Symmetric Algorithms
5.1 Modes of Operation
5.2