Introduction to Cryptography with Coding Theory

ISBN-10: 0131862391
ISBN-13: 9780131862395
Edition: 2nd 2006
List price: $175.00 Buy it from $22.32 Rent it from $33.12
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The  More...

Used Starting from $55.48
New Starting from $150.35
Rent Starting from $33.12
what's this?
Rush Rewards U
Members Receive:
coins
coins
You have reached 400 XP and carrot coins. That is the daily max!
You could win $10,000

Get an entry for every item you buy, rent, or sell.

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Calculus 1 Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought

Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

Book details

List price: $175.00
Edition: 2nd
Copyright year: 2006
Publisher: Prentice Hall PTR
Publication date: 7/15/2005
Binding: Hardcover
Pages: 592
Size: 7.50" wide x 9.50" long x 1.25" tall
Weight: 2.376

With its conversational tone and practical focus, this text mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field. Assumes a minimal background. The level of math sophistication is equivalent to a course in linear algebra. Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL. Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm. Includes expanded discussions of block ciphers, hash functions, and multicollisions, plus additional attacks on RSA to make readers aware of the strengths and shortcomings of this popular scheme. For engineers interested in learning more about cryptography.

Preface
Overview of Cryptography and Its Applications
Secure Communications
Cryptographic Applications
Classical Cryptosystems
Shift Ciphers
Affine Ciphers
The Vigenere Cipher
Substitution Ciphers
Sherlock Holmes
The Playfair and ADFGX Ciphers
Block Ciphers
Binary Numbers and ASCII
One-Time Pads
Pseudo-random Bit Generation
LFSR Sequences
Enigma
Exercises
Computer Problems
Basic Number Theory
Basic Notions
Solving ax + by = d
Congruences
The Chinese Remainder Theorem
Modular Exponentiation
Fermat and Euler
Primitive Roots
Inverting Matrices Mod n
Square Roots Mod n
Legendre and Jacobi Symbols
Finite Fields
Continued Fractions
Exercises
Computer Problems
The Data Encryption Standard
Introduction
A Simplified DES-Type Algorithm
Differential Cryptanalysis
DES
Modes of Operation
Breaking DES
Meet-in-the-Middle Attacks
Password Security
Exercises
Computer Problems
The Advanced Encryption Standard: Rijndael
The Basic Algorithm
The Layers
Decryption
Design Considerations
Exercises
The RSA Algorithm
The RSA Algorithm
Attacks on RSA
Primality Testing
Factoring
The RSA Challenge
An Application to Treaty Verification
The Public Key Concept
Exercises
Computer Problems
Discrete Logarithms
Discrete Logarithms
Computing Discrete Logs
Bit Commitment
Diffie-Hellman Key Exchange
The ElGamal Public Key Cryptosystem
Exercises
Computer Problems
Hash Functions
Hash Functions
A Simple Hash Example
The Secure Hash Algorithm
Birthday Attacks
Multicollisions
The Random Oracle Model
Using Hash Functions to Encrypt
Exercises
Computer Problems
Digital Signatures
RSA Signatures
The ElGamal Signature Scheme
Hashing and Signing
Birthday Attacks on Signatures
The Digital Signature Algorithm
Exercises
Computer Problems
Security Protocols
Intruders-in-the-Middle and Impostors
Key Distribution
Kerberos
Public Key Infrastructures (PKI)
X.509 Certificates
Pretty Good Privacy
SSL and TLS
Secure Electronic Transaction
Exercises
Digital Cash
Digital Cash
Exercises
Secret Sharing Schemes
Secret Splitting
Threshold Schemes
Exercises
Computer Problems
Games
Flipping Coins over the Telephone
Poker over the Telephone
Exercises
Zero-Knowledge Techniques
The Basic Setup
The Feige-Fiat-Shamir Identification Scheme
Exercises
Information Theory
Probability Review
Entropy
Huffman Codes
Perfect Secrecy
The Entropy of English
Exercises
Elliptic Curves
The Addition Law
Elliptic Curves Mod p
Factoring with Elliptic Curves
Elliptic Curves in Characteristic 2
Elliptic Curve Cryptosystems
Identity-Based Encryption
Exercises
Computer Problems
Lattice Methods
Lattices
Lattice Reduction
An Attack on RSA
NTRU
Exercises
Error Correcting Codes
Introduction
Error Correcting Codes
Bounds on General Codes
Linear Codes
Hamming Codes
Golay Codes
Cyclic Codes
BCH Codes
Reed-Solomon Codes
The McEliece Cryptosystem
Other Topics
Exercises
Computer Problems
Quantum Techniques in Cryptography
A Quantum Experiment
Quantum Key Distribution
Shor's Algorithm
Exercises
Mathematica Examples
Getting Started with Mathematica
Some Commands
Examples for Chapter 2
Examples for Chapter 3
Examples for Chapter 6
Examples for Chapter 8
Examples for Chapter 12
Examples for Chapter 13
Examples for Chapter 16
Maple Examples
Getting Started with Maple
Some Commands
Examples for Chapter 2
Examples for Chapter 3
Examples for Chapter 6
Examples for Chapter 8
Examples for Chapter 12
Examples for Chapter 13
Examples for Chapter 16
Matlab Examples
Getting Started with Matlab
Examples for Chapter 2
Examples for Chapter 3
Examples for Chapter 6
Examples for Chapter 8
Examples for Chapter 12
Examples for Chapter 13
Examples for Chapter 16
Suggestions for Further Reading
Bibliography
Index

×
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.

×