Looking for an examination copy?
If you are interested in the title for your course we can consider offering an examination copy. To register your interest please contact email@example.com providing details of the course you are teaching.
Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.Read more
- Intended as a gentle introduction to the principles and elementary mathematics underlying modern cryptography, accessible to undergraduates and graduate students alike
- Presents a look under the hood, examining security techniques and the reasons they are thought to be secure
Not yet reviewed
Be the first to review
Review was not posted due to profanity×
- Date Published: March 2014
- format: Paperback
- isbn: 9781107603455
- length: 186 pages
- dimensions: 228 x 152 x 15 mm
- weight: 0.3kg
- contains: 72 b/w illus.
- availability: In stock
Table of Contents
2. Modular arithmetic
3. The addition cypher, an insecure block cypher
5. Probability theory
6. Perfect secrecy and perfectly secure cryptosystems
7. Number theory
8. Euclid's algorithm
9. Some uses of perfect secrecy
10. Computational problems, easy and hard
11. Modular exponentiation, modular logarithm, and one-way functions
12. Diffie and Hellman's exponential-key-agreement protocol
13. Computationally secure single-key cryptosystems
14. Public-key cryptosystems and digital signatures.
Sorry, this resource is locked
Please register or sign in to request access. If you are having problems accessing these resources please email firstname.lastname@example.orgRegister Sign in
You are now leaving the Cambridge University Press website. Your eBook purchase and download will be completed by our partner www.ebooks.com. Please see the permission section of the www.ebooks.com catalogue page for details of the print & copy limits on our eBooks.Continue ×