Codes: The Guide to Secrecy From Ancient to Modern TimesFrom the Rosetta Stone to public-key cryptography, the art and science of cryptology has been used to unlock the vivid history of ancient cultures, to turn the tide of warfare, and to thwart potential hackers from attacking computer systems. Codes: The Guide to Secrecy from Ancient to Modern Times explores the depth and breadth of the field, remain |
Contents
1 | |
From SixteenthCentury Cryptography to the New Millennium The Last 500 Years | 59 |
SymmetricKey Cryptography | 107 |
PublicKey Cryptography | 161 |
Cryptographic Protocols | 191 |
Key Management | 233 |
Message Authentication | 251 |
Electronic Mail and Internet Security | 271 |
Mathematical Facts | 466 |
Pseudorandom Number Generation | 506 |
Factoring Large Integers | 509 |
Technical and Advanced Details | 527 |
Probability Theory | 543 |
Recognizing Primes | 550 |
Exercises | 561 |
Bibliography | 605 |
Applications and the Future | 329 |
Noncryptographic Security Issues | 375 |
Information Theory and Coding | 425 |
627 | |
629 | |
Other editions - View all
Codes: The Guide to Secrecy From Ancient to Modern Times Richard A. Mollin No preview available - 2005 |
Common terms and phrases
algorithm Alice Alice’s allows applications assume attack authentication bank bits block called certificate cipher ciphertext communications contains created cryptographic cryptosystem deciphering decryption defined Definition denoted described developed Diagram discussed employed enciphering encryption example execute Exercises exists fact factor field function given Hence host idea identity input instance integer Internet known later letter linear look matrix means mechanism method mode modulo Moreover namely Once operations original output packet plaintext polynomial possible prime probability problem protocol Prove provides random received round scheme secret selects sends sent server signature signed standard step Suppose symbols Table term Theorem verify