出版時(shí)間:2004-1 出版社:科學(xué)出版社 作者:Wade Trappe 頁數(shù):490 字?jǐn)?shù):504000
Tag標(biāo)簽:無
內(nèi)容概要
本書的一個(gè)重要特色——它覆蓋的范圍相當(dāng)廣泛。本書前8章涵蓋了密碼學(xué)的主要領(lǐng)域:經(jīng)典密碼理論、基礎(chǔ)數(shù)論、RSA算法與數(shù)字簽名等。本書后9章講述了密鑰共享方案、游戲理論、信息論、電子商務(wù)、數(shù)字鈔票與“零知識”技術(shù)等等。在附錄部分,作者給出了分別用Mathematica、Maple和MATLAB實(shí)現(xiàn)算法的事例。 本書可作為高年級本科生和研究生的有關(guān)密碼學(xué)與網(wǎng)絡(luò)安全及相關(guān)專業(yè)的教材。
書籍目錄
Preface1 Overview 1.1 Secure Communications 1.2 Cryptographic Applications2 Classical Cryptosystems 2.1 Shift Ciphers 2.2 Affine Ciphers 2.3 The Vigenere Cipher 2.4 Substitution Ciphers 2.5 Sherlock Holmes 2.6 The Playfair and ADFGX Ciphers 2.7 Block Ciphers 2.8 Binary Numbers and ASCII 2.9 One-Time Pads 2.10 Pseudo-random Bit Generation 2.11 Linear Feedback Shift Register Sequences 2.12 Enigma 2.13 Exercise 2.14 Computer Problems3 Basic Number Theory 3.1 Basic Notions 3.2 Soluing ax+by=d 3.3 Congruences 3.4 The Chinese Remainder Theorem 3.5 Modular Exponentiation 3.6 Fermat and Euler 3.7 Primitive Roots 3.8 Inverting Matrices Mod n 3.9 Square Roots Mod n 3.10 Finite Fields 3.11 Exercises 3.12 Computer Problems4 The Data Encryption Standard 4.1 Introduction 4.2 A Simplified DES-Type Algorithm 4.3 Differential Cryptanalysis 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Password Security 4.8 Exercises5 AES:Rijndael 5.1 The Basic Algorithm 5.2 The Layers 5.3 Deciryption 5.4 Design Considerations6 The RBA Algorithm 6.1 The RSA Algorithm 6.2 Attacks on RSA 6.3 Primality Testing 6.4 Factoring 6.5 The RSA Challenge 6.6 An Application to Treaty Verification 6.7 The Public Key Concept 6.8 Exercises 6.9 Computer Problems7 Discrete Logarithms 7.1 Discrete Logarithms 7.2 Computing Discrete Logs 7.3 Bit Commitment 7.4 The ElGamal Public Key Cryptosystem 7.5 Exercises 7.6 Computer Problems8 Digital Signatures 8.1 RSA Signatures 8.2 The ElGamal Signature Scheme 8.3 Hash Functions 8.4 Birthday Attacks 8.5 The Digital Signature Algorithm 8.6 Exercises 8.7 Computer Problems9 E-Commerce and Digital Cash10 Secret Sharing Schemes11 Games12 Zero-Knowledge Techniques13 Key Establishment Protocols14 Information Theory15 Elliptic Curves16 Error Correcting Codes17 Quantum CryptographyA MathematicaB Maple ExamplesC MATLAB ExamplesD Further Reading BibliographyIndex
圖書封面
圖書標(biāo)簽Tags
無
評論、評分、閱讀與下載