Computer security and cryptography

Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect...

Full description

Saved in:
Bibliographic Details
Main Authors: Konheim, Alan G., 1934
Published:
Literature type: Electronic eBook
Language: English
Subjects:
Online Access: http://onlinelibrary.wiley.com/book/10.1002/0470083980
Summary: Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema.
Carrier Form: 1 online resource (xvii, 521 pages) : illustrations
Bibliography: Includes bibliographical references and index.
ISBN: 9780470083970 (electronic bk.)
0470083972 (electronic bk.)
9780470083987
0470083980
Index Number: QA76
CLC: TP309
Contents: COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.