Cryptology Unlocked

Front Cover
John Wiley & Sons, Aug 20, 2007 - Computers - 554 pages
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic protocols, digital standards and much more. This innovative book will reveal some of the dangers of code breaking, and highlights ways to master code-breaking and attack algorithms.

Topics range from the simplest enciphering methods to precise investigations of modern algorithms. Everything you need to understand the delicate balance between complex and actual information, with a peppering of anecdotes along the way.

Join the cryptology adventure, and understand:

  • The difference between good and bad algorithms
  • Whether or not secret services can read all messages
  • The real-world affect cryptography had on World War II
  • The unspoken security risks behind digital mobile standards GSM and UMTS
  • The everyday implications on digital signatures, PINs and online banking
 

What people are saying - Write a review

User Review - Flag as inappropriate

Useful for Sysadmins, Hackers and the paranoid kind

Contents

1 Introduction
1
2 Cryptology from the Romans to World War II
17
3 Cryptanalysis in Detail
61
4 Development Milestones DES RSA
123
5 Life After DES New Methods New Attacks
205
6 Cryptographic Protocols
313
7 Practical Applications
409
8 Cryptology Politics and Business
459
Glossary
487
Appendix A1 Sources of Information
501
Appendix A2 Bibliography
515
Index
527
Copyright

Other editions - View all

Common terms and phrases

About the author (2007)

Reinhard Wobst studied mathematics at Technical University of Dresden and obtained his PhD in the field of scholastic processes in 1980. He now works as an independent programmer for scientific and industrial applications in C/C++ as well as script languages.
In 1980, he conducted his first experiments with cryptographic algorithms. This hobby has led to numerous articles discussing cryptography, through to security consulting and security software development. All this writing has resulted in this book, which is now in its third edition in the original German and is published here in English for the first time.

Bibliographic information