## Invitation to Cryptology |

### What people are saying - Write a review

### Contents

Classical Cryptographic Techniques | 56 |

Symmetric ComputerBased Cryptology | 177 |

PublicKey Cryptography | 243 |

Copyright | |

5 other sections not shown

## What people are saying - Write a reviewWe haven't found any reviews in the usual places. ## Contents
5 other sections not shown ## Common terms and phrasesaffine cipher Alice and Bob Alice's applied ASCII base twenty-six binary representation bits block cipher Bob's calculate cipher alphabet ciphertext ciphertext letters cleartext column columnar transposition congruences corresponding coset cryptanalysis cryptology decimal decipher the message decipherment decryption determine digital signature divisor ElGamal enciphered English Euclidean algorithm Example Exercise exponent F G H Figure formula given hash function hash value Hill cipher implementation index of coincidence input instance intercepted Kathryn key letter keyword length knapsack letter frequencies mathematical matrix modulo modulo 26 monoalphabetic substitution multiplicative inverse number of letters numerical equivalents obtain permutation plaintext plaintext letters polyalphabetic positive integer prime factors prime numbers probability problem produce protocol public-key cryptography random range received relatively prime represent result scrawl selected sender sends shift cipher shift register Solution solve string Suppose Table theorem verify words write Zeke ## Bibliographic information |