Cryptography Demystified

1st Edition
0071543155 · 9780071543156
US$54.00
Request Review Copy
Download file to PC or Mac desktops or laptops

Step 1. Download Adobe Digital Editions Both PC and Mac users will need to download Adobe Digital Editions to access their eBook. You can download Adobe Digital Editions at Adobe's website here.


Step 2. Register an Adobe ID if you do not already have one. (This step is optional, but allows you to open the file on multiple devices) Visit account.Adobe.com to register your Adobe account.


Step 3: Authorize Adobe Digital Editions using your Adobe ID. In Adobe Digital Editions, go to the Help menu. Choose “Authorize Computer.”


Step 4: Open your file with Adobe Digital Editions. Once you’ve linked your Adobe Digital Editions with your Adobe ID, you should be able to access your eBook on any device which supports Adobe Digital Editions and is authorized with your ID. If your eBook does not open in Adobe Digital Editions upon download, please contact customer service

Part I: INTRODUCTION TO SYMMETRIC CRYPTOGRAPHY

Module 1 First Considerations

Exercise 1

Module 2 Plaintext

Exercise 2

Module 3 Digitization of Plaintext

Exercise 3

Module 4 Toward a Cryptographic Paradigm

Exercise 4

Module 5 What We Want from the Keytext

Exercise 5

Module 6 Randomness I

Exercise 6

Module 7 Finite State Sequential Machines

Exercise 7 Transition Matrix

Module 8 m-sequences

Exercise 8

Module 9 The Paradigm Attempted

Exercise 9

Module 10 The Block Cipher Function - A Modern Keystoneto the Paradigm

Exercise 10

Module 11 Confidentiality Modes: ECB and CTR

Exercise 11

Module 12 Confidentiality Mode: Output Feedback (OFB)

Exercise 12

Module 13 Confidentiality Modes: Cipher Feedback (CFB)and Cipher Block Chaining (CBC)

Exercise 13

Part II NUMBER THEORY WE WILL NEED

Module 14 Prime Numbers I

Exercise 14

Module 15 Congruences

Exercise 15

Module 16 Euler-Fermat Theorem

Exercise 16

Module 17 The Euler Phi (f) Function

Exercise 17

Module 18 The Binary Exponentiation Algorithm

Exercise 18

Module 19 The Extended Euclidean Algorithm

Exercise 19

Module 20 Primitive Roots

Exercise 20

Module 21 Chinese Remainder Theorem

Exercise 21

Part III INTRODUCTION TO PUBLIC KEY CRYPTOGRAPHY

Module 22 Merkle's Puzzle

Exercise 22

Module 23 The Diffie-Hellman Public Key Cryptographic System

Exercise 23

Module 24 Split Search

Exercise 24

Module 25 A Variant of the Diffie-Hellman System

Exercise 25

Module 26 The RSA Public Key Cryptographic System

Exercise 26

Module 27 Prime Numbers II

Exercise 27

Part IV KEYING VARIABLES

Module 28 Keying Variable Distribution

Exercise 28

Module 29 Secret Sharing

Exercise 29

Module 30 Randomness II

Exercise 30

Module 31 Cryptovariables

Exercise 31

Part V CRYPTO-OBSOLESCENCE

Module 32 The Aging Cryptoalgorithm

Exercise 32

Module 33 SUPERDES(tm)

Exercise 33

Part VI CHANNEL-BASED CRYPTOGRAPHY

Module 34 The Channel Is the Cryptovariable

Exercise 34

Module 35 The Quantum Cryptographic Channel

Exercise 35

Answers to Exercises

Glossary

Index