Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cryptography demystified
Bookmark Share

Text

Cryptography demystified

Hersey, John E. - Personal Name;

Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY
Module 1 First Considerations
Module 2 Plaintext
Module 3 Digitization of Plaintext
Module 4 Toward a Cryptographic Paradigm
Module 5 What We Want from the Keytext
Module 6 Randomness I
Module 7 Finite State Sequential Machines
Module 8 m-sequences
Module 9 The Paradigm Attempted
Module 10 The Block Cipher Function - A Modern Keystone to the Paradigm
Module 11 Confidentiality Modes: ECB and CTR
Module 12 Confidentiality Mode: Output Feedback (OFB)
Module 13 Confidentiality Modes: Cipher Feedback (CFB) and Cipher Block Chaining (CBC)
Part II NUMBER THEORY WE WILL NEED
Module 14 Prime Numbers I
Module 15 Congruences
Module 16 Euler-Fermat Theorem
Module 17 The Euler Phi (f) Function
Module 18 The Binary Exponentiation Algorithm
Module 19 The Extended Euclidean Algorithm
Module 20 Primitive Roots
Module 21 Chinese Remainder Theorem
Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY
Module 22 Merkle's Puzzle
Module 23 The Diffie-Hellman Public Key Cryptographic System
Module 24 Split Search
Module 25 A Variant of the Diffie-Hellman System
Module 26 The RSA Public Key Cryptographic System
Module 27 Prime Numbers II
Part IV KEYING VARIABLES
Module 28 Keying Variable Distribution
Module 29 Secret Sharing
Module 30 Randomness II
Module 31 Cryptovariables
Part V CRYPTO-OBSOLESCENCE
Module 32 The Aging Cryptoalgorithm
Module 33 SUPERDES(tm)
Part VI CHANNEL-BASED CRYPTOGRAPHY
Module 34 The Channel Is the Cryptovariable
Module 35 The Quantum Cryptographic Channel
Answers to Exercises
Glossary
Index

Anotation:
AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY
Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other.


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.82 HER c
00000750
Available
#
Perpustakaan Poltek SSN (Rak 000) 005.82 HER c/2
00000751
Available
#
Perpustakaan Poltek SSN (Rak 000) 005.82 HER c/3
00000752
Available
#
Perpustakaan Poltek SSN (Rak 000) 005.82 HER c/4
00000753
Available
Detail Information
Series Title
--
Call Number
005.82 HER c
Publisher
New York : McGraw-Hill., 2003
Collation
x, 356 hlm.: ilus.; 23 cm
Language
English
ISBN/ISSN
9780071406383
Classification
005.82
Content Type
-
Media Type
-
Carrier Type
-
Edition
null
Subject(s)
Kriptografi
Specific Detail Info
-
Statement of Responsibility
John E. Hersey
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?