Buy Textbooks  |  Rent Textbooks  |  Sell Textbooks  |  eTextbooks
Help  |  Questions? 1-877-292-6442
Hello, Sign In
Your Account
0

Introduction to Cryptography with Coding Theory - 2nd edition

Introduction to Cryptography with Coding Theory (ISBN10: 0131862391; ISBN13: 9780131862395)
ISBN13: 978-0131862395
ISBN10: 0131862391

Summary: With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.

Features
  • Balances applied and theoretical aspects of security--Presents applications and protocols where cryptographic primitives are used in practice, such as SE
    T and SSL.
  • Coverage of Rijndael and AES--Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm.
  • Coverage of practical applications of cryptography to security protocols--Connects the cryptographic tools developed earlier in the book to the building of real security tools, demonstrating to students that there is more to security and cryptography than just math.
  • Friendly, story-like discussion of security concepts--Uses historical examples to illustrate the concepts of security and cryptanalysis by relating theory to easier-to-grasp events.
  • Modern methods such as Elliptic curves, Lattice methods, and Quantum Techniques--Provides thorough coverage of topics that are becoming increasingly prominent in the field.
  • Major coverage of coding theory--Offers a discussion of coding theory, which is often covered in today's cryptology courses.
  • Numerous example calculations--Includes many examples, especially in purely mathematical chapters such as Ch. 3.
  • Public key certificate--Provides an example of what an actual public key certificate looks like, rather than just describing it.
  • Mathematica/Maple/Matlab problems and notebooks--Allow students to work with realistic sized examples in RSA and Digital Signatures, as well as classical cryptosystems and those with elliptic curves.
  • Practical examples and applications--Give students hands-on experience with the large-numbered cryptography of today's security systems, and provides a discussion of security protocols.
New To This Edition
  • New problems in Chs. 3 and 6--Offers instructors an expanded problem set.
  • Sections on Legendre and Jacobi symbols and Continued Fractions in Ch. 3--Allows instructors to cover more advanced material (such as an attack on RSA) in later chapters.
  • More modes of operation in Ch. 4--Completes the discussion of block ciphers.
  • Additional attacks on RSA--Makes students aware of the strengths and shortcomings of this popular scheme.
  • New material on hash functions--Expands the coverage of these important cryptographic primitives, including recent advancements relevant to the security profession.
  • Updated discussion of multicollisions--Keeps students up-to-date on events that will have a significant impact on security systems over the next few years.
...show more
Summary: With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.

Features
  • Balances applied and theoretical aspects of security--Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL.
  • Coverage of Rijndael and AES--Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm.
  • Coverage of practical applications of cryptography to security protocols--Connects the cryptographic tools developed earlier in the book to the building of real security tools, demonstrating to students that there is more to security and cryptography than just math.
  • Friendly, story-like discussion of security concepts--Uses historical examples to illustrate the concepts of security and cryptanalysis by relating theory to easier-to-grasp events.
  • Modern methods such as Elliptic curves, Lattice methods, and Quantum Techniques--Provides thorough coverage of topics that are becoming increasingly prominent in the field.
  • Major coverage of coding theory--Offers a discussion of coding theory, which is often covered in today's cryptology courses.
  • Numerous example calculations--Includes many examples, especially in purely mathematical chapters such as Ch. 3.
  • Public key certificate--Provides an example of what an actual public key certificate looks like, rather than just describing it.
  • Mathematica/Maple/Matlab problems and notebooks--Allow students to work with realistic sized examples in RSA and Digital Signatures, as well as classical cryptosystems and those with elliptic curves.
  • Practical examples and applications--Give students hands-on experience with the large-numbered cryptography of today's security systems, and provides a discussion of security protocols.
New To This Edition
  • New problems in Chs. 3 and 6--Offers instructors an expanded problem set.
  • Sections on Legendre and Jacobi symbols and Continued Fractions in Ch. 3--Allows instructors to cover more advanced material (such as an attack on RSA) in later chapters.
  • More modes of operation in Ch. 4--Completes the discussion of block ciphers.
  • Additional attacks on RSA--Makes students aware of the strengths and shortcomings of this popular scheme.
  • New material on hash functions--Expands the coverage of these important cryptographic primitives, including recent advancements relevant to the security profession.
  • Updated discussion of multicollisions--Keeps students up-to-date on events that will have a significant impact on security systems over the next few years.
...show less

Edition/Copyright: 2ND 06
Cover: Hardback
Publisher: Prentice Hall, Inc.
Year Published: 2006
International: No

View Table of Contents



List Price: $168.00
Used $89.46
$44.73 after Buyback
Used
Save $78.54 (47%)
  • FREE shipping over $25
  • In stock
  • 30-day returns
Condition:
Order this book in the next 1 days, 8 hours and 16 minutes and it ships by Noon CT Monday!
  • Sell back
    to us by
  • Guaranteed
    Cash Back
  • Book cost
    after Buyback
  • Dec 31, 2015
  • $44.73
  • $44.73
New $132.30
$66.15 after Buyback
Rental $21.49
Due back 12/18/2015
Close
Close
Close