Skip to content

Introduction to Cryptography

Best in textbook rentals since 2012!

ISBN-10: 1584886188

ISBN-13: 9781584886181

Edition: 2nd 2006 (Revised)

Authors: Richard A. Mollin

List price: $115.00
Blue ribbon 30 day, 100% satisfaction guarantee!
Rent eBooks
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation,…    
Customers also bought

Book details

List price: $115.00
Edition: 2nd
Copyright year: 2006
Publisher: CRC Press LLC
Publication date: 9/18/2006
Binding: Hardcover
Pages: 413
Size: 6.50" wide x 9.50" long x 1.25" tall
Weight: 1.628
Language: English

Preface
Mathematical Basics
Divisibility
Primes, Primality Testing, and Induction
An Introduction to Congruences
Euler, Fermat, and Wilson
Primitive Roots
The Index Calculus and Power Residues
Legendre, Jacobi, & Quadratic Reciprocity
Complexity
Cryptographic Basics
Definitions and Illustrations
Classic Ciphers
Stream Ciphers
LFSRs
Modes of Operation
Attacks
DES and AES
S-DES and DES
AES
Public-Key Cryptography
The Ideas Behind PKC
Digital Envelopes and PKCs
RSA
ElGamal
DSA - The DSS
Primality Testing
True Primality Tests
Probabilistic Primality Tests
Recognizing Primes
Factoring
Classical Factorization Methods
The Continued Fraction Algorithm
Pollard's Algorithms
The Quadratic Sieve
The Elliptic Curve Method (ECM)
Electronic Mail and Internet Security
History of the Internet and the WWW
Pretty Good Privacy (PGP)
Protocol Layers and SSL
Internetworking and Security - Firewalls
Client-Server Model and Cookies
Leading-Edge Applications
Login and Network Security
Viruses and Other Infections
Smart Cards
Biometrics
Fundamental Facts
Computer Arithmetic
The Rijndael S-Box
Knapsack Ciphers
Silver-Pohlig-Hellman Algorithm
SHA-1
Radix-64 Encoding
Quantum Cryptography
Solutions to Odd-Numbered Exercises
Bibliography
List of Symbols
Index
About the Author