- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors.Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphersUnderstand asymmetric cryptography algorithmsDesign s-boxes that maximize output non-linearityDeploy cryptographic hashesCreate cryptographic keys using pseudo random number generatorsEncrypt Web traffic using SSL/TLSSecure VPN, WiFi, and SSH communicationsWork with cryptanalysis and steganography Explore government, military, and intelligence agency applications
Contents
Section IChapter 1: History of Cryptography to the 1800'sChapter 2: History of Cryptography from the 1800'sChapter 3: Basic Information TheoryChapter 4: Essential Number Theory and Discrete MathChapter 5: Essential AlgebraSection II: Symmetric Ciphers and HashesChapter 6: Feistel NetworksChapter 7: Substitution-Permutation NetworksChapter 8: S-Box DesignChapter 9: Cryptographic HashesSection III: Asymmetric CiphersChapter 10: Common AlgorithmsChapter 11: ECCSection IV: ApplicationsChapter 12: Random Number GeneratorsChapter 13: SSL/TLSChapter 14: VPNsChapter 15: Military ApplicationsChapter 16: SteganographyChapter 17: CryptanalysisChapter 18: Cryptographic BackdoorsChapter 19: The Future of CryptographySection V: AppendicesAppendix A: Implementing CryptographyNER(01): WOW