Computer Security and Cryptography by Alan G. Konheim (Hardcover - Jan 29, 2007)
Updates readers of this book with all the tools, techniques and concepts needed to understand and implement data security systems. A wide range of topics for a thorough understanding of the factors affecting the efficiency of confidentiality, authentication, and digital signature scheme. Most importantly, readers gain hands-on experience in cryptanalysis and learn to create effective cryptographic systems.
The author participated in the design and analysis of the Data Encryption Standard (DES), a widely used symmetric encryption algorithm key. Its recommendations are based on firsthand experience of what works and does not work.
Comprehensive in its coverage, the book begins with an analysis of the history of cryptography, including a description of the basic encryption systems and many of the encryption systems used in the twentieth century. Then the author analyzes the theory of symmetric and public key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn from the practical limitations of the technology. The book ends with two chapters that explore a wide range of applications of cryptography.
Three basic types of chapters are featured to facilitate learning:
Computer Security And Cryptography.pdf
Updates readers of this book with all the tools, techniques and concepts needed to understand and implement data security systems. A wide range of topics for a thorough understanding of the factors affecting the efficiency of confidentiality, authentication, and digital signature scheme. Most importantly, readers gain hands-on experience in cryptanalysis and learn to create effective cryptographic systems.
The author participated in the design and analysis of the Data Encryption Standard (DES), a widely used symmetric encryption algorithm key. Its recommendations are based on firsthand experience of what works and does not work.
Comprehensive in its coverage, the book begins with an analysis of the history of cryptography, including a description of the basic encryption systems and many of the encryption systems used in the twentieth century. Then the author analyzes the theory of symmetric and public key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn from the practical limitations of the technology. The book ends with two chapters that explore a wide range of applications of cryptography.
Three basic types of chapters are featured to facilitate learning:
- Chapters that develop technical skills
- Chapters that describe a cryptosystem and present a method of analysis
- Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions
Computer Security And Cryptography.pdf