Contents: I INTRODUCTION 1 Crypto 2 Crypto basics 3 Symmetric key crypto 4 Public key crypto 5 Hash function and other topics 6 Advanced cryptanalysis II ACCESS CONTROL 7 Authentication 8 Authorization III PROTOCOLS 9 Simple authention protocols 10 Real-world security protocols IV SOFTWARE 11 Software flaw and malware 12 Insecurity in software 13 Operating syst…
Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra
Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. ContentsList of Algorithms List of Tables List of Figures Acronyms Preface 1 Introduction and Overview 1.1 Cryptography basics 1.2 Public-key cryptography 1.2.1 RSAsystems 1.2.2 Discrete logarithmsystems 1.2.3 Elliptic curve systems 1.3 Why elliptic curve cryptography? 1.4 Roadmap 1.5 Notes and further references 2 Finite Fi…