Computer Security and Cryptography

Front Cover
John Wiley & Sons, Mar 7, 2007 - Computers - 504 pages
Gain the skills and knowledge needed to create effective data security systems

This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.

The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.

Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.

Three basic types of chapters are featured to facilitate learning:

  • Chapters that develop technical skills
  • Chapters that describe a cryptosystem and present a method of analysis
  • Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions

With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

 

What people are saying - Write a review

We haven't found any reviews in the usual places.

Contents

CHAPTER 1 APERITIFS
1
CHAPTER 2 COLUMNAR TRANSPOSITION
18
CHAPTER 3 MONOALPHABETIC SUBSTITUTION
63
CHAPTER 4 POLYALPHABETIC SUBSTITUTION
116
CHAPTER 5 STATISTICAL TESTS
136
CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES
150
CHAPTER 7 THE JAPANESE CIPHER MACHINES
191
CHAPTER 8 STREAM CIPHERS
244
CHAPTER 12 THE RSA CRYPTOSYSTEM
376
CHAPTER 13 PRIME NUMBERS AND FACTORIZATION
390
CHAPTER 14 THE DISCRETE LOGARITHM PROBLEM
414
CHAPTER 15 ELLIPTIC CURVE CRYPTOGRAPHY
429
CHAPTER 16 KEY EXCHANGE IN A NETWORK
447
CHAPTER 17 DIGITAL SIGNATURES AND AUTHENTICATION
464
CHAPTER 18 APPLICATIONS OF CRYPTOGRAPHY
480
CHAPTER 19 CRYPTOGRAPHIC PATENTS
506

CHAPTER 9 BLOCKCIPHERS LUCIFER DES AND AES
283
CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY
334
CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM
344

Other editions - View all

Common terms and phrases

About the author (2007)

ALAN G. KONHEIM, PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models.

Bibliographic information