Introduction to cryptography / (Record no. 71422)

000 -LEADER
fixed length control field 07065cam a2200721Ki 4500
001 - CONTROL NUMBER
control field 9781351628150
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220711212512.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180921s2018 flua ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781315114590
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1315114593
-- (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781351628150
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1351628151
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781351628136
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1351628135
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781351628129
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 1351628127
082 04 - CLASSIFICATION NUMBER
Call Number 003/.54
100 1# - AUTHOR NAME
Author Padhye, Sahadeo,
245 10 - TITLE STATEMENT
Title Introduction to cryptography /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource (xv, 251 pages) :
500 ## - GENERAL NOTE
Remark 1 "A science publishers book."
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital.
505 0# - FORMATTED CONTENTS NOTE
Remark 2 Cover; Title Page; Copyright Page; Dedication; Foreword; Preface; Table of Contents; 1 Overview of Cryptography; 1.1 Introduction; 1.2 Goals of Cryptography; 1.3 Classification of Cryptosystem; 1.4 Practically Useful Cryptosystem; 1.4.1 Confusion and Diffusion; 1.5 Cryptanalysis; 1.5.1 Types of Attackers; 1.5.2 Types of Attacks; 1.5.3 Security Notions; 2 Basic Algebra; 2.1 Group; 2.2 Ring; 2.3 Field; 2.3.1 Finite Field; 2.3.2 Field Construction; 2.3.3 Field Construction using Irreducible Polynomial; 2.3.4 Galois Field GF(2n); 2.3.4.1 Integer Representation of Finite Field Elements.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 2.3.5 Field Construction using Generator2.4 Exercises; 3 Number Theory; 3.1 Prime Numbers; 3.2 Cardinality of Primes; 3.3 Extended Euclidean Algorithm; 3.4 Congruences; 3.4.1 Solving Linear Congruence in Zn; 3.4.2 Chinese Remainder Theorem (CRT); 3.5 Integer Factorization Problem; 3.5.1 Trial Division Method; 3.5.2 Fermat's Method; 3.5.3 Pollard's p -- 1 Method; 3.5.4 Pollard's Rho Method; 3.5.5 Quadratic Sieve; 3.5.6 Number Field Sieve; 3.6 Primality Testing; 3.6.1 Sieve of Eratosthenes; 3.6.2 Divisibility Algorithm; 3.6.3 AKS Algorithm; 3.6.4 Fermat Test; 3.6.5 Miller-Rabin Algorithm.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 3.7 Quadratic Congruence3.7.1 Quadratic Residue or Non-Residue; 3.7.2 Legendre Symbol and Jacobi Symbol; 3.8 Exponentiation and Logarithm; 3.8.1 Square and Multiply Method; 3.9 Discrete Logarithm Problem; 3.9.1 Shank's Baby-Step Giant-Step Algorithm; 3.9.2 Pollard's Rho Algorithm; 3.9.3 Pohlig-Hellman Algorithm; 3.9.4 Index Calculus Algorithm; 3.10 Exercises; 4 Probability and Perfect Secrecy; 4.1 Basic Concept of Probability; 4.2 Birthday Paradox; 4.3 Perfect Secrecy; 4.4 Vernam One-Time Pad; 4.5 Random Number Generation; 4.6 Pseudo-random Number Generator; 4.7 Exercises; 5 Complexity Theory.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 5.1 Running Time and Size of Input5.2 Big-O Notation; 5.2.1 Big-O and Growth Rate; 5.2.2 Properties of Order Notation; 5.3 Types of Algorithm; 5.4 Complexity Classes; 5.5 Exercises; 6 Classical Cryptosystems; 6.1 Classification of Classical Cryptosystem; 6.2 Block Cipher; 6.2.1 Substitution Cipher; 6.2.1.1 Shift Cipher; 6.2.1.2 Affine Cipher; 6.2.1.3 Substitution Cipher; 6.2.1.4 Vigenere Cipher; 6.2.1.5 Hill Cipher; 6.2.2 Transposition Cipher; 6.2.2.1 Scytale; 6.2.2.2 The Rail Fence Cipher; 6.3 Stream Cipher; 6.3.1 Synchronous Stream Cipher.
505 8# - FORMATTED CONTENTS NOTE
Remark 2 6.3.1.1 Vigenere Cipher as Synchronous Stream Cipher6.3.2 Linear Feedback Shift Register (LFSR); 6.3.3 Non-Synchronous Stream Cipher; 6.3.3.1 Autokey Cipher; 6.4 Cryptanalysis of Cryptosystems; 6.4.1 Frequency Analysis; 6.4.2 Cryptanalysis of Affine Cipher; 6.4.3 Cryptanalysis of Substitution Cipher; 6.4.4 Cryptanalysis of Vigenere Cipher; 6.4.5 Cryptanalysis of Hill Cipher; 6.4.6 Cryptanalysis of LFSR Stream Cipher; 6.5 Exercises; 7 Block Ciphers; 7.1 Introduction; 7.1.1 Notations; 7.2 Modes of Operation; 7.2.1 Electronic Code Book (ECB); 7.2.1.1 ECB Properties.
520 2# - SUMMARY, ETC.
Summary, etc "Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. Students who have elementary knowledge of mathematics, will be introduced to mathematical notions relevant to cryptography, and the design and analysis of the cryptographic schemes. More advanced students who have already a background of algebra, number theory, probability and algorithms; will be able to review the applications of secure systems and will be introduced to cryptographic primitives and current research, besides being exposed to scope of future research addressing the open problems in related area. This book gives more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research."--Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Mathematics.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision System Theory.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
General subdivision Operations Research.
700 1# - AUTHOR 2
Author 2 Sahu, Rajeev A.,
700 1# - AUTHOR 2
Author 2 Saraswat, Vishal,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781351628150
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781315114590
856 42 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://www.oclc.org/content/dam/oclc/forms/terms/vbrl-201703.pdf
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton, FL :
-- CRC Press, Taylor & Francis Group,
-- [2018]
264 #4 -
-- ©2018
336 ## -
-- text
-- txt
-- rdacontent
337 ## -
-- computer
-- c
-- rdamedia
338 ## -
-- online resource
-- cr
-- rdacarrier
588 ## -
-- OCLC-licensed vendor bibliographic record.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Cryptography
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Number theory.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Algorithms.
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- SCIENCE
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- TECHNOLOGY & ENGINEERING
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- COMPUTERS / Cryptography
650 #7 - SUBJECT ADDED ENTRY--SUBJECT 1
-- MATHEMATICS / Combinatorics

No items available.