Text
Cryptography demystified
Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY
Module 1 First Considerations
Module 2 Plaintext
Module 3 Digitization of Plaintext
Module 4 Toward a Cryptographic Paradigm
Module 5 What We Want from the Keytext
Module 6 Randomness I
Module 7 Finite State Sequential Machines
Module 8 m-sequences
Module 9 The Paradigm Attempted
Module 10 The Block Cipher Function - A Modern Keystone to the Paradigm
Module 11 Confidentiality Modes: ECB and CTR
Module 12 Confidentiality Mode: Output Feedback (OFB)
Module 13 Confidentiality Modes: Cipher Feedback (CFB) and Cipher Block Chaining (CBC)
Part II NUMBER THEORY WE WILL NEED
Module 14 Prime Numbers I
Module 15 Congruences
Module 16 Euler-Fermat Theorem
Module 17 The Euler Phi (f) Function
Module 18 The Binary Exponentiation Algorithm
Module 19 The Extended Euclidean Algorithm
Module 20 Primitive Roots
Module 21 Chinese Remainder Theorem
Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY
Module 22 Merkle's Puzzle
Module 23 The Diffie-Hellman Public Key Cryptographic System
Module 24 Split Search
Module 25 A Variant of the Diffie-Hellman System
Module 26 The RSA Public Key Cryptographic System
Module 27 Prime Numbers II
Part IV KEYING VARIABLES
Module 28 Keying Variable Distribution
Module 29 Secret Sharing
Module 30 Randomness II
Module 31 Cryptovariables
Part V CRYPTO-OBSOLESCENCE
Module 32 The Aging Cryptoalgorithm
Module 33 SUPERDES(tm)
Part VI CHANNEL-BASED CRYPTOGRAPHY
Module 34 The Channel Is the Cryptovariable
Module 35 The Quantum Cryptographic Channel
Answers to Exercises
Glossary
Index
Anotation:
AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY
Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other.
No other version available