Skip to content

Introduction to Cryptography with Coding Theory

Best in textbook rentals since 2012!

ISBN-10: 0130618144

ISBN-13: 9780130618146

Edition: 2002

Authors: Lawrence C. Washington, Wade Trappe

List price: $84.00
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Customers also bought

Book details

List price: $84.00
Copyright year: 2002
Publisher: Prentice Hall PTR
Publication date: 9/21/2001
Binding: Hardcover
Pages: 504
Size: 7.25" wide x 9.50" long x 1.00" tall
Weight: 1.980
Language: English

Preface
Overview
Secure Communications
Cryptographic Applications
Classical Cryptosystems
Shift Ciphers
Affine Ciphers
The Vingenere Cipher
Substitution Ciphers
Sherlock Holmes
The Playfair and ADFGX Ciphers
Block Ciphers
Binary Numbers and ASCII
One-Time Pads
Pseudo-random Bit Generation
Linear Feedback Shift Register Sequences
Enigma
Exercises
Computer Problems
Basic Number Theory
Basic Notions
Solving ax + by = d
Congruences
The Chinese Remainder Theorem
Modular Exponentiation
Fermat and Euler
Primitive Roots
Inverting Matrices Mod n
Square Roots Mod n
Finite Fields
Exercises
Computer Problems
The Data Encryption Standard
Introduction
A Simplified DES-Type Algorithm
Differential Cryptoanalysis
DES
Modes of Operation
Breaking DES
Password Security
Exercises
AES: Rijndael
The Basic Algorithm
The Layers
Decryption
Design Considerations
The RSA Algorithm
The RSA Algorithm
Attacks on RSA
Primality Testing
Factoring
The RSA Challenge
An Application to Treaty Verification
The Public Key Concept
Exercises
Computer Problems
Discrete Logarithms
Discrete Logarithms
Computing Discrete Logs
Bit Commitment
The ElGamal Public Key Cryptosystem
Exercise
Computer Problems
Digital Signatures
RSA Signatures
The ElGamal Signature Scheme
Hash Functions
Birthday Attacks
The Digital Signature Algorithm
Exercises
Computer Problems
E-Commerce and Digital Cash
Secure Electronic Transaction
Digital Cash
Exercises
Secret Sharing Schemes
Secret Splitting
Threshold Schemes
Exercises
Computer Problems
Games
Flipping Coins over the Telephone
Poker over the Telephone
Exercises
Zero Knowledge Techniques
The Basic Setup
Feige-Fiat-Shamir Identification Scheme
Exercises
Key Establishment Protocols
Key Agreement Protocols
Key Pre-distribution
Key Distribution
Public Key Infrastructures (PKI)
Exercises
Information Theory
Probability Theory
Entropy
Huffman Codes
Perfect Secrecy
The Entropy of English
Exercises
Elliptic Curves
The Addition Law
Elliptic Curves Mod n
Factoring with Elliptic Curves
Elliptic Curves in Characteristic 2
Elliptic Curve Cryptosystems
Exercises
Computer Systems
Error Correcting Codes
Introduction
Error Correcting Codes
Bounds on General Codes
Linear Codes
Hamming Codes
Golay Codes
Cyclic Codes
BCH Codes
Reed-Solomon Codes
The McEliece Cryptosystem
Other Topics
Exercises
Computer Problems
Quantum Cryptography
A Quantum Experiment
Quantum Key Distribution
Shor's Algorithm
Exercises
Mathematica
Getting Started with Mathematica
Some Commands
Examples for Chapter 2
Examples for Chapter 3
Examples for Chapter 6
Examples for Chapter 8
Examples for Chapter 10
Examples for Chapter 11
Examples for Chapter 15
Maple
Getting Started with Maple
Some Commands
Examples for Chapter 2
Examples for Chapter 3
Examples for Chapter 6
Examples for Chapter 8
Examples for Chapter 10
Examples for Chapter 11
Examples for Chapter 15
Matlab
Getting Started with MATLAB
Examples for Chapter 2
Examples for Chapter 3
Examples for Chapter 6
Examples for Chapter 8
Examples for Chapter 10
Examples for Chapter 11
Examples for Chapter 15
Further Reading
Bibliography
Index