LEADER 04723nam 22007695 450 001 9910624391103321 005 20251009103000.0 010 $a9783031123047$b(electronic bk.) 010 $z9783031123030 024 7 $a10.1007/978-3-031-12304-7 035 $a(MiAaPQ)EBC7127770 035 $a(Au-PeEL)EBL7127770 035 $a(CKB)25219376500041 035 $a(PPN)265862752 035 $a(DE-He213)978-3-031-12304-7 035 $a(OCoLC)1351311553 035 $a(EXLCZ)9925219376500041 100 $a20221029d2022 u| 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aModern Cryptography $eApplied Mathematics for Encryption and Information Security /$fby William Easttom 205 $a2nd ed. 2022. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2022. 215 $a1 online resource (460 pages) 225 1 $aComputer Science Series 311 08$aPrint version: Easttom, William Modern Cryptography Cham : Springer International Publishing AG,c2023 9783031123030 320 $aIncludes bibliographical references and index. 327 $aChapter 1. History of Cryptography to the 1800s -- Chapter 2. History of Cryptography from the 1800?s -- Chapter 3. Basic Information Theory -- Chapter 4. Essential Number Theory and Discrete Math -- Chapter 5. Essential Algebra -- Chapter 6. Fiestel Networks -- Chapter 7. Substitution-Permutation Networks -- Chapter 8. S-Box Design -- Chapter 9. Cryptographic Hashes -- Chapter 10. Asymmetric Algorithms -- Chapter 11. Elliptic Curve Cryptography -- Chapter 12. Random Number Generators -- Chapter 13.SSL/TLS -- Chapter 14. Virtual Private networks, Authentication, And Wireless Security -- Chapter 15. Military Applications -- Chapter 16. Steganography -- Chapter 17. Cryptanalysis -- Chapter 18. Cryptographic Backdoors -- Chapter 19. Quantum Computing and Cryptography. 330 $aThis expanded textbook, now in its second edition, is a practical yet in depth guide to cryptography and its principles and practices. Now featuring a new section on quantum resistant cryptography in addition to expanded and revised content throughout, the book continues to place cryptography in real-world security situations using the hands-on information contained throughout the chapters. Prolific author Dr. Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Readers learn and test out how to use ciphers and hashes, generate random keys, handle VPN and Wi-Fi security, and encrypt VoIP, Email, and Web communications. The book also covers cryptanalysis, steganography, and cryptographic backdoors and includes a description of quantum computing and its impact on cryptography. This book is meant for those without a strong mathematics background with only just enough math to understand the algorithms given. The book contains a slide presentation, questions and answers, and exercises throughout. Presents new and updated coverage of cryptography including new content on quantum resistant cryptography; Covers the basic math needed for cryptography - number theory, discrete math, and algebra (abstract and linear); Includes a full suite of classroom materials including exercises, Q&A, and examples. . 410 0$aComputer Science Series 606 $aTelecommunication 606 $aData structures (Computer science) 606 $aInformation theory 606 $aNumber theory 606 $aData protection 606 $aComputational intelligence 606 $aStatistics 606 $aCommunications Engineering, Networks 606 $aData Structures and Information Theory 606 $aComputational Number Theory 606 $aData and Information Security 606 $aComputational Intelligence 606 $aApplied Statistics 615 0$aTelecommunication. 615 0$aData structures (Computer science) 615 0$aInformation theory. 615 0$aNumber theory. 615 0$aData protection. 615 0$aComputational intelligence. 615 0$aStatistics. 615 14$aCommunications Engineering, Networks. 615 24$aData Structures and Information Theory. 615 24$aComputational Number Theory. 615 24$aData and Information Security. 615 24$aComputational Intelligence. 615 24$aApplied Statistics. 676 $a005.8 700 $aEasttom$b Chuck$01228300 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 912 $a9910624391103321 996 $aModern cryptography$92851574 997 $aUNINA