古典・最新暗号学(テキスト・第2版)<br>Cryptology : Classical and Modern (Chapman & Hall/crc Cryptography and Network Security Series) (2ND)

個数:
電子版価格
¥23,680
  • 電子版あり

古典・最新暗号学(テキスト・第2版)
Cryptology : Classical and Modern (Chapman & Hall/crc Cryptography and Network Security Series) (2ND)

  • 在庫がございません。海外の書籍取次会社を通じて出版社等からお取り寄せいたします。
    通常6~9週間ほどで発送の見込みですが、商品によってはさらに時間がかかることもございます。
    重要ご説明事項
    1. 納期遅延や、ご入手不能となる場合がございます。
    2. 複数冊ご注文の場合は、ご注文数量が揃ってからまとめて発送いたします。
    3. 美品のご指定は承りかねます。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Hardcover:ハードカバー版/ページ数 496 p.
  • 言語 ENG
  • 商品コード 9781138047624
  • DDC分類 005.82

Full Description

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Alberti, Vigenère, and Hill ciphers. It also includes coverage of the Enigma machine, Turing bombe, and Navajo code. Additionally, the book presents modern methods like RSA, ElGamal, and stream ciphers, as well as the Diffie-Hellman key exchange and Advanced Encryption Standard. When possible, the book details methods for breaking both classical and modern methods.

The new edition expands upon the material from the first edition which was oriented for students in non-technical fields. At the same time, the second edition supplements this material with new content that serves students in more technical fields as well. Thus, the second edition can be fully utilized by both technical and non-technical students at all levels of study. The authors include a wealth of material for a one-semester cryptology course, and research exercises that can be used for supplemental projects. Hints and answers to selected exercises are found at the end of the book.

Features:




Requires no prior programming knowledge or background in college-level mathematics



Illustrates the importance of cryptology in cultural and historical contexts, including the Enigma machine, Turing bombe, and Navajo code



Gives straightforward explanations of the Advanced Encryption Standard, public-key ciphers, and message authentication



Describes the implementation and cryptanalysis of classical ciphers, such as substitution, transposition, shift, affine, Alberti, Vigenère, and Hill

Contents

1. Introduction to Cryptology

Basic Terminology

Cryptology in Practive

Why Study Cryptology?

2. Substitution Ciphers

Keyword Substitution Ciphers

Cryptanalysis of Substitution Cipher

Playrair Ciphers

The Navajo Code

3. Transposition Ciphers

Columnar Transposition Ciphers

Cryptanalysis of Transposition Ciphers

ADFGX and ADFGVX Ciphers

4. The Enigma Machine

The Enigma Cipher Machine

Combinatorics

Security of the Enigma Machine

5. The Turing Bombe

Cribs and Menus

Loops and Logical Inconsistencies

Searching for the Correct Configuration

The Diagonal Board

The Checking Machine

Turnovers

Clonking

Final Observations

6. Shift and Affine Ciphers

Modular Arithmetic

Shift Ciphers

Cryptanalysis of Shift Ciphers

Affine Ciphers

Cryptanalysis of Affine Ciphers

7. Alberti and Vigenere Ciphers

Alberti Ciphers

Vigenere Ciphers

Probability

The Friedman Test

The Kasiski Test

Cryptanalyis of Vigenere Keyword Ciphers

8. Hill Ciphers

Matrices

Hill Ciphers

Cryptanalyis of Hill Ciphers

9. RSA Ciphers

Introduction to Public-Key Ciphers

Introduction to RSA Ciphers

The Euclidean Algorithm

Modular Exponentiation

ASCII

RSA Ciphers

Cryptanalyis of RSA Ciphers

Primality Testing

Integer Factorization

The RSA Factoring Challenges

10. ElGamal Ciphers

The Diffie-Hellman Key Exchange

Discrete Logarithms

ElGamal Ciphers

Cryptanalyis of ElGamal Ciphers

11. The Advanced Encryption Standard

Representations of Numbers

Sream Ciphers

AES Preliminaries

AES Encryption

AES Decryption

AES Security

12. Message Authentication

RSA Signatures

Hash Functions

RSA Signatures with Hashing

The Man-in-the-Middle Attack

Public-Key Infrastructures

Bibliography

Hints and Answers for Selected Exercises

Index

最近チェックした商品