Applied Cryptography(Chinese Edition)

9787030258410: Applied Cryptography(Chinese Edition)
View all copies of this ISBN edition:

Paperback. Pub Date :2009-11-01 Language: Chinese Publisher: Science Press basic information [ title ] Applied Cryptography [Press] Science Press % 1-566099 % [author Dai Lin Dong . CAO Tian-jie ed [ ISBN 9787030258410 ] [ Original ] 28nbsp Publication Date 2009-11-01 00:00:00 2009-11-01 00:00:00 [ print Date ] [ Format ] [ Paperback ] 16 [ word Format ] [ Pages ] 0 [ Version times in the first edition [ impressions ] Introduction Applied cryptography for many years engaged in the application of cryptography based on the teaching and research work written in the book comprehensively. systematically and accurately describes the basic concepts of modern cryptography . theory and algorithms. The book is divided into 11 chapters. including : Cryptography overview of classical cryptography. information theory-based cryptography . stream ciphers . block ciphers . Hash functions . ...

"synopsis" may belong to another edition of this title.

Buy New View Book

Shipping: FREE
From China to U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace


ISBN 10: 703025841X ISBN 13: 9787030258410
New paperback Quantity Available: 10
liu xing
(JiangSu, JS, China)

Book Description paperback. Condition: New. Ship out in 2 business day, And Fast shipping, Free Tracking number will be provided after the shipment.Paperback. Pages Number: 215 Publisher: Science Press Pub. Date :2009-11-01. This book is the author of Applied Cryptography for many years engaged in teaching and research work made on the basis of writing. The book comprehensively. systematically and accurately describes the basic concepts of modern cryptography. theory and algorithms. The book is divided into 11 chapters. including: an overview of cryptography. classical cryptography. information theory-based cryptography. stream ciphers. block ciphers. Hash function. message authentication codes. public key cryptography. digital signatures. side-channel attacks and cryptographic protocols. Each chapter comes with exercises to help readers grasp the important points of this chapter and to be consolidated. Refined language book. the concept of accurate. comprehensive. both about the cryptographic algorithms of the classic algorithm. also includes the latest standard cryptography algorithms. This book can serve as institutions of higher learning information security. information counter. computer science and technology. mathematics and other professional undergraduate and graduate teaching. but also for the information security field engineering and technical officers. Contents: Chapter 1 Overview of Cryptography basic concepts of cryptography 1.1 1.2 1.3 cryptanalysis cryptography cryptography method of attack 1.3.1 1.3.2 1.4 decipher the type of password system password security exercises in Chapter 2 Classical cryptography 2.1 replacement Cryptography 2.1.1 2.1.2 single multi-table table replacement password replacement substitution cipher cryptosystem 2.3 2.2 classic cryptosystem analysis 2.3.1 2.3.2 statistical properties of single-table statistical analysis of the password system password system 2.3.3 multi-table statistics Analysis Exercises Chapter 3 the basis of information theory. cryptography-based probability theory 3.1 3.2 3.3 complete confidentiality of information measure (entropy) 3.3.1 3.3.2 information related concepts of information theory the entropy of the basic nature of the measure 3.4 3.5 pseudo-key and the only a solution of the product of cryptography from 3.6 Exercises Chapter 4 serial password 4.1 4.2 stream cipher key stream with the basic concept of the key generator 4.3 4.4 linear feedback shift register sequence of a linear shift register random polynomial that 4.5 concepts and pseudo-random m-sequence block cipher Exercise 5.1 in Chapter 5 the basic concepts of block cipher data encryption standard DES5.2.1DES 5.2 Overview 5.2.2DES encryption algorithm to decrypt the encryption process described 5.2.3DES sub-key generation process 5.2.4DES 5.2.5DES triple DKS5.3 security 5.2.6 Advanced Encryption Standard encryption transform 5.3.2AEs AES5.3.1AES the decryption key schedule 5.3.3AES 5.4 IDEA5.4.1IDEA international data encryption algorithm algorithm algorithm description 5.4.2IDEA 5.4.3IDEA decryption key generation algorithm described 5.5SMS4 cryptographic algorithms 5.5.1 5.6 5.5.2 key expansion block cipher mode of operation 5.6.1 Electronic Code of this mode (ECB) 5.6.2 Cipher Block Chaining mode (CBC) 5.6 .3 Cipher Feedback mode (CFB) 5.6.4 Output feedback mode (OFB) 5.6.5 count mode (CTR) 5.7 block cipher analysis technology substitution a permutation network 5.7.1 5.7.2 5.7.3 Differential linear cryptanalysis cryptanalysis Exercises Chapter 6 the nature of the function Hash function 6.1Hash nature 6.1.1Hash function iteration 6.1.3 6.1.2 birthday attack the structure of 6.2Hash function Hash function Hash function instance 6.2.1MD5 6.2.2 Secure Hash Algorithm 6.3 Examples of application exercises Hash Function Chapter 7 Message Authentication Code 7.1 7.1.1 Message Authentication Code based on the structure of MAC7.1.2 block cipher with key-based Hash function MAC7.2MAC security function message authentication code of the application. Seller Inventory # H31831

More information about this seller | Contact this seller

Buy New
US$ 57.64
Convert currency

Add to Basket

Shipping: FREE
From China to U.S.A.
Destination, rates & speeds