Cryptography Demystified

Paperback | September 13, 2002

byJohn Hershey

not yet rated|write a review
AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY . . Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one endand decrypted at the other. i Cryptoi is part of the job description for network designers, network engineers, and telecom developers. If you need cryptography basicsi but dread the thick tomes that are your only other optioni help is at hand. Cryptography Demystified puts the fundamentals into a 35-module, learn-by-doing package thati s actually fun to use.. . You must read this book ifi . * You prefer your simplifications from an expert who understands the complexities . * 6 years of success as a short course for students and professionals works for you. * you enjoy hearing the phrase i nothing to memorizei . * ecommerce, email, network security, or wireless communications is part of your bailiwick. * cracking cryptography means a jump up the career ladder. * the words i public-key cryptography,i i channel-based cryptography,i and i prime numbersi pique your interest . * best-practices cryptography is the only secure way for youi and your companyi to go. . One of the most complex subjects in Information Technology, cryptography gets its due in this down-to-earth, self-teaching tutoriali the first to make the basics of the science truly accessible..

Pricing and Purchase Info

$59.16 online
$79.95 list price (save 26%)
In stock online
Ships free on orders over $25

From the Publisher

AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHY . . Cryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one endand decrypted at the other. i Cryptoi is part of the job description for network designers, network engineers, and telecom de...

From the Jacket

AN UNCONVENTIONAL, FUN WAY TO MASTER THE BASICS OF CRYPTOGRAPHYCryptography is not just for specialists. Now every wireless message, wireless phone call, online transaction, and email is encrypted at one end and decrypted at the other. “Crypto” is part of the job description for network designers, network engineers, and telecom develop...

John E. Hershey has more than 30 years’ experience in telecom security. The author or co-author of five advanced texts: Hadamard Matrix Analysis and Synthesis : With Applications to Communications and Signal/Image Processing; The Elements of System Design; Data Transportation and Protection (Applications of Communications Theory); Pers...

other books by John Hershey

Cryptography Demystified
Cryptography Demystified

Kobo ebook|Aug 23 2002

$57.59 online$74.80list price(save 23%)
The Eureka Method: How to Think Like an Inventor
The Eureka Method: How to Think Like an Inventor

Kobo ebook|Aug 30 2011

$31.39 online$40.68list price(save 22%)
Mr. Mean Streak
Mr. Mean Streak

Kobo ebook|Jan 27 2004

$10.79 online$13.99list price(save 22%)
see all books by John Hershey
Format:PaperbackDimensions:356 pages, 9.1 × 7.3 × 0.95 inPublished:September 13, 2002Publisher:McGraw-Hill EducationLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:0071406387

ISBN - 13:9780071406383

Look for similar items by category:

Customer Reviews of Cryptography Demystified

Reviews

Extra Content

Table of Contents

Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY

Module 1 First Considerations

Exercise 1

Module 2 Plaintext

Exercise 2

Module 3 Digitization of Plaintext

Exercise 3

Module 4 Toward a Cryptographic Paradigm

Exercise 4

Module 5 What We Want from the Keytext

Exercise 5

Module 6 Randomness I

Exercise 6

Module 7 Finite State Sequential Machines

Exercise 7 Transition Matrix

Module 8 m-sequences

Exercise 8

Module 9 The Paradigm Attempted

Exercise 9

Module 10 The Block Cipher Function - A Modern Keystoneto the Paradigm

Exercise 10

Module 11 Confidentiality Modes: ECB and CTR

Exercise 11

Module 12 Confidentiality Mode: Output Feedback (OFB)

Exercise 12

Module 13 Confidentiality Modes: Cipher Feedback (CFB)and Cipher Block Chaining (CBC)

Exercise 13

Part II NUMBER THEORY WE WILL NEED

Module 14 Prime Numbers I

Exercise 14

Module 15 Congruences

Exercise 15

Module 16 Euler-Fermat Theorem

Exercise 16

Module 17 The Euler Phi (f) Function

Exercise 17

Module 18 The Binary Exponentiation Algorithm

Exercise 18

Module 19 The Extended Euclidean Algorithm

Exercise 19

Module 20 Primitive Roots

Exercise 20

Module 21 Chinese Remainder Theorem

Exercise 21

Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY

Module 22 Merkle's Puzzle

Exercise 22

Module 23 The Diffie-Hellman Public Key Cryptographic System

Exercise 23

Module 24 Split Search

Exercise 24

Module 25 A Variant of the Diffie-Hellman System

Exercise 25

Module 26 The RSA Public Key Cryptographic System

Exercise 26

Module 27 Prime Numbers II

Exercise 27

Part IV KEYING VARIABLES

Module 28 Keying Variable Distribution

Exercise 28

Module 29 Secret Sharing

Exercise 29

Module 30 Randomness II

Exercise 30

Module 31 Cryptovariables

Exercise 31

Part V CRYPTO-OBSOLESCENCE

Module 32 The Aging Cryptoalgorithm

Exercise 32

Module 33 SUPERDES(tm)

Exercise 33

Part VI CHANNEL-BASED CRYPTOGRAPHY

Module 34 The Channel Is the Cryptovariable

Exercise 34

Module 35 The Quantum Cryptographic Channel

Exercise 35

Answers to Exercises

Glossary

Index