Limit search to available items
Book Cover
E-book
Author Klima, Richard

Title Cryptology : Classical and Modern
Edition 2nd ed
Published Milton : Chapman and Hall/CRC, 2018

Copies

Description 1 online resource (497 pages)
Series Chapman and Hall/CRC Cryptography and Network Security Ser
Chapman and Hall/CRC Cryptography and Network Security Ser
Contents Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; 1: Introduction to Cryptology; 1.1 Basic Terminology; 1.2 Cryptology in Practice; 1.3 Why Study Cryptology?; 2: Substitution Ciphers; 2.1 Keyword Substitution Ciphers; 2.1.1 Simple Keyword Substitution Ciphers; 2.1.2 Keyword Columnar Substitution Ciphers; 2.1.3 Exercises; 2.2 Cryptanalysis of Substitution Ciphers; 2.2.1 Exercises; 2.3 Playfair Ciphers; 2.3.1 Exercises; 2.4 The Navajo Code; 2.4.1 Exercises; 3: Transposition Ciphers; 3.1 Columnar Transposition Ciphers; 3.1.1 Simple Columnar Transposition Ciphers
3.1.2 Keyword Columnar Transposition Ciphers3.1.3 Exercises; 3.2 Cryptanalysis of Transposition Ciphers; 3.2.1 Cryptanalysis of Simple Columnar Ciphers; 3.2.2 Cryptanalysis of Keyword Columnar Ciphers; 3.2.3 Exercises; 3.3 ADFGX and ADFGVX Ciphers; 3.3.1 Exercises; 4: The Enigma Machine; 4.1 The Enigma Cipher Machine; 4.1.1 Exercises; 4.2 Combinatorics; 4.2.1 The Multiplication Principle; 4.2.2 Permutations; 4.2.3 Combinations; 4.2.4 Exercises; 4.3 Security of the Enigma Machine; 4.3.1 Number of Initial Configurations; 4.3.2 Background on Cryptanalysis; 4.3.3 Exercises; 5: The Turing Bombe
5.1 Cribs and Menus5.1.1 Exercises; 5.2 Loops and Logical Inconsistencies; 5.2.1 Exercises; 5.3 Searching for the Correct Configuration; 5.3.1 Exercises; 5.4 The Diagonal Board; 5.4.1 Exercises; 5.5 The Checking Machine; 5.5.1 Exercises; 5.6 Turnovers; 5.6.1 Exercises; 5.7 Clonking; 5.7.1 Exercises; 5.8 Final Observations; 5.8.1 Exercises; 6: Shift and Affine Ciphers; 6.1 Modular Arithmetic; 6.1.1 Exercises; 6.2 Shift Ciphers; 6.2.1 Exercises; 6.3 Cryptanalysis of Shift Ciphers; 6.3.1 Exercises; 6.4 Affine Ciphers; 6.4.1 Exercises; 6.5 Cryptanalysis of Affine Ciphers; 6.5.1 Exercises
7: Alberti and Vigenère Ciphers7.1 Alberti Ciphers; 7.1.1 Exercises; 7.2 Vigenère Ciphers; 7.2.1 Vigenère Autokey Ciphers; 7.2.2 Vigenère Keyword Ciphers; 7.2.3 Exercises; 7.3 Probability; 7.3.1 Exercises; 7.4 The Friedman Test; 7.4.1 The Index of Coincidence; 7.4.2 Estimating the Keyword Length; 7.4.3 Exercises; 7.5 The Kasiski Test; 7.5.1 Exercises; 7.6 Cryptanalysis of Vigenère Keyword Ciphers; 7.6.1 Finding the Keyword Length Using Signatures; 7.6.2 Finding the Keyword Letters Using Scrawls; 7.6.3 Exercises; 8: Hill Ciphers; 8.1 Matrices; 8.1.1 Definition and Basic Terminology
8.1.2 Matrix Operations8.1.3 Identity and Inverse Matrices; 8.1.4 Matrices with Modular Arithmetic; 8.1.5 Exercises; 8.2 Hill Ciphers; 8.2.1 Exercises; 8.3 Cryptanalysis of Hill Ciphers; 8.3.1 Exercises; 9: RSA Ciphers; 9.1 Introduction to Public-Key Ciphers; 9.1.1 Exercises; 9.2 Introduction to RSA Ciphers; 9.2.1 Exercises; 9.3 The Euclidean Algorithm; 9.3.1 Exercises; 9.4 Modular Exponentiation; 9.4.1 Exercises; 9.5 ASCII; 9.5.1 Exercise; 9.6 RSA Ciphers; 9.6.1 Exercises; 9.7 Cryptanalysis of RSA Ciphers; 9.7.1 Exercises; 9.8 Primality Testing; 9.8.1 Exercises; 9.9 Integer Factorization
Summary Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods. The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book
Notes 9.9.1 Exercises
Print version record
Subject Cryptography.
Cryptography -- Data processing
Data encryption (Computer science)
Ciphers.
ciphers (codes)
MATHEMATICS -- Recreations & Games.
MATHEMATICS -- Combinatorics.
classical ciphers.
cryptanalysis.
cryptographic algorithms.
cryptology textbook.
Enigma cipher machine.
Introduction to Cryptology.
Maplet-based examples.
Message Authentication.
mathematics in cryptology.
Navajo code.
public-key cryptography.
U.S. cryptographic standards.
Ciphers
Cryptography
Cryptography -- Data processing
Data encryption (Computer science)
Form Electronic book
Author Sigmon, Neil
ISBN 9781351692540
1351692542
9781351692533
1351692534
9781351692526
1351692526
9781315170664
1315170663