Classical and contemporary cryptology
One of the core technologies that protects cyberspace, cryptology is also intellectually stimulating and fun. This is the only book available that combines classical and contemporary methods of cryptology with a historical perspective. Encourages readers to explore their strengths and weaknesses as they experiment with various ciphers. Features seamless integration between the book's material and accompanying software package (CAP), which enables readers to experiment with the concepts discussed. Covers the practical use of a stream cipher. Uses Block Ciphers in a network, presenting another case where readers are introduced to the actual use of a cipher system. Offers charts at the end of each chapter that show how the new ciphers covered in that chapter fit into the entire classification scheme of cipher systems, helping readers understand the interrelationships which exist between ciphers. A useful and interesting reference for network security professionals.
What people are saying - Write a review
We haven't found any reviews in the usual places.
Introduction to Cryptology
Classical Polyalphabetic Ciphers
13 other sections not shown
affine cipher algorithm Alice and Bob Alice's autokey binary block cipher Bob and Alice Bob's break CAP provides cell centiban Chapter ciphertext ciphertext characters ciphertext letters classical ciphers column transposition create cryptanalysis cryptography cryptology cylinder decipher enciphered encryption Enter Eve's example factor goes to position hash function hash value Help Quit Hill cipher implementation initial input integer key bits keystream keyword cipher knapsack known plaintext known word known-plaintext attack length LFSR match matrix method monoalphabetic cipher operation output pairs permutation cipher plaintext character plaintext letter Playfair cipher Playfair square polyalphabetic cipher polygraphic possible key prime number private key problem produce protocol quantum random number rectangle result Rijndael rotor S-DES Sbox secret key secure segment sends shift shown in Figure stream cipher subkey substitution transposition cipher Vigenere cipher vowels weakness window