Cryptology : (Record no. 2941)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05219cam a22002298a 4500 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781439872413 (hardcover : alk. paper) |
040 ## - CATALOGING SOURCE | |
Transcribing agency | CUS |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
Item number | KLI/C |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Klima, Richard E. |
245 10 - TITLE STATEMENT | |
Title | Cryptology : |
Sub title | classical and modern with maplets / |
Statement of responsibility, etc. | Richard E. Klima, Neil P. Sigmon. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Boca Raton, FL |
Name of publisher, distributor, etc. | CRC Press, |
Date of publication, distribution, etc. | c2012. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xiv, 541 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
440 #0 - SERIES | |
Title | Discrete mathematics and its applications |
500 ## - GENERAL NOTE | |
General note | "A Chapman & Hall book." |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE | |
Formatted contents note | Introduction to Cryptology<br/>1.1 Basic Terminology .<br/>1.2 Cryptology in Practice .<br/>1.3 Why Study Cryptology?<br/>Substitution Ciphers<br/>2.1 Keyword Substitution Ciphers . .<br/>2.1.1 Simple Keyword Substitution Ciphers . .<br/>2.1.2 Keyword Columnar Substitution Ciphers<br/>2.2 A Maplet for Substitution Ciphers . .<br/>2.3 Cryptanalysis of Substitution Ciphers<br/>2.4 A Maplet for Cryptanalysis of Substitution Ciphers<br/>2.5 Playfair Ciphers .<br/>2.6 A Maplet for Playfair Ciphers .<br/>Transposition Ciphers<br/>3.1 Columnar Transposition Ciphers<br/>3.1.1 Simple Columnar Transposition Ciphers . .<br/>3.1.2 Keyword Columnar Transposition Ciphers .<br/>3.2 A Maplet for Transposition Ciphers . .<br/>3.3 Cryptanalysis of Transposition Ciphers .<br/>3.3.1 Cryptanalysis of Simple Columnar Ciphers<br/>3.3.2 Cryptanalysis of Keyword Columnar Ciphers<br/>3.4 Maplets for Cryptanalysis of Transposition Ciphers<br/>3.5 ADFGX and ADFGVX Ciphers . .<br/>3.6 A Maplet for ADFGX and ADFGVX Ciphers<br/>The Enigma Machine and Navajo Code<br/>4.1 The Enigma Cipher Machine .<br/>4.2 A Maplet for the Enigma Cipher Machine<br/>4.3 Combinatorics .<br/>4.3.1 The Multiplication Principle<br/>4.3.2 Permutations .<br/>4.3.3 Combinations .<br/>4.4 Cryptanalysis of the Enigma Cipher Machine<br/>4.4.1 Calculating the Number of Initial Configurations<br/>4.4.2 Some History of Cryptanalysis of the Enigma . .<br/>4.5 The Navajo Code .<br/>4.6 A Maplet for the Navajo Code<br/>5 Shift and Affine Ciphers<br/>5.1 Modular Arithmetic .<br/>5.2 A Maplet for Modular Reduction<br/>5.3 Shift Ciphers . .<br/>5.4 A Maplet for Shift Ciphers<br/>5.5 Cryptanalysis of Shift Ciphers . .<br/>5.6 A Maplet for Cryptanalysis of Shift Ciphers .<br/>5.7 Affine Ciphers . . .<br/>5.8 A Maplet for Affine Ciphers . .<br/>5.9 Cryptanalysis of Affine Ciphers<br/>5.10 A Maplet for Cryptanalysis of Affine Ciphers<br/>6 Alberti and Vigenere Ciphers<br/>6.1 Alberti Ciphers .<br/>6.2 A Maplet for Alberti Ciphers . .<br/>6.3 Vigenere Ciphers .<br/>6.3.1 Vigenere Autokey Ciphers .<br/>6.3.2 Vigenere Keyword Ciphers<br/>6.4 A Maplet for Vigenere Keyword Ciphers . .<br/>6.5 Probability . .<br/>6.6 The Friedman Test . .<br/>6.6.1 The Index of Coincidence . . .<br/>6.6.2 Estimating the Keyword Length<br/>6.7 A Maplet for the Friedman Test. . . .<br/>6.8 The Kasiski Test .<br/>6.9 A Maplet for the Kasiski Test . .<br/>6.10 Cryptanalysis of Vigenere Keyword Ciphers<br/>6.10.1 Finding the Keyword Length Using Signatures . .<br/>6.10.2 Finding the Keyword Letters Using Scrawls<br/>6.11 A Maplet for Cryptanalysis of Vigenere Keyword Ciphers<br/>xn<br/>7 Hill Ciphers<br/>7.1 Matrices .<br/>7.1.1 Definition and Basic Terminology .<br/>7.1.2 Matrix Operations<br/>7.1.3 Identity and Inverse Matrices .<br/>7.1.4 Matrices with Modular Arithmetic . .<br/>7.2 A Maplet for Matrix Computations .<br/>7.3 Hill Ciphers .<br/>7.4 A Maplet for Hill Ciphers . .<br/>7.5 Cryptanalysis of Hill Ciphers<br/>7.6 A Maplet for Cryptanalysis of Hill Ciphers<br/>8 RSA Ciphers<br/>8.1 Introduction to Public-Key Ciphers . .<br/>8.2 Introduction to RSA Ciphers .<br/>8.3 The Euclidean Algorithm . . .<br/>8.4 Maplets for the Euclidean Algorithm .<br/>8.5 Modular Exponentiation<br/>8.6 A Maplet for Modular Exponentiation<br/>8.7 ASCII<br/>8.8 RSA Ciphers<br/>8.9 Maplets for RSA Ciphers .<br/>8.10 Cryptanalysis of RSA Ciphers<br/>8.11 A Maplet for Cryptanalysis of RSA Ciphers<br/>8.12 Primality Testing<br/>8.13 Integer Factorization<br/>8.14 The RSA Factoring Challenges<br/>9 EIGamal Ciphers<br/>9.1 The Diffie-Hellman Key Exchange<br/>9.2 Maplets for the Diffie-Hellman Key Exchange<br/>9.3 Discrete Logarithms . .<br/>9.4 A Maplet for Discrete Logarithms<br/>9.5 EIGamal Ciphers . .<br/>9.6 Maplets for EIGamal Ciphers . . .<br/>9.7 Cryptanalysis of EIGamal Ciphers<br/>9.8 A Maplet for Cryptanalysis of EIGamal Ciphers<br/>10 The Advanced Encryption Standard<br/>10.1 Representations of Numbers . .<br/>10.1.1 Binary . . . .<br/>10.1.2 Hexadecimal<br/>10.2 A Maplet for Base Conversions<br/>10.3 Stream Ciphers .<br/>10.4 A Maplet for Stream Ciphers .<br/>10.5 AES Preliminaries .<br/>10.5.1 Plaintext Format .<br/>10.5.2 The S-Box<br/>10.5.3 Key Format and Generation .<br/>10.6 AES Encryption .<br/>10.6.1 Overview .<br/>10.6.2 The Operations .<br/>10.7 AES Decryption . .<br/>10.8 A Maplet for AES Ciphers .<br/>10.9 AES Security .<br/>11 Message Authentication<br/>11.1 RSA Signatures .<br/>11.2 Hash Functions .<br/>11.3 RSA Signatures with Hashing .<br/>11.4 Maplets for RSA Signatures . .<br/>11.5 The Man-in-the-Middle Attack<br/>11.6 A Maplet for the Man-in-the-Middle Attack<br/>11.7 Public-Key Infrastructures .<br/>11.7.1 Key Formation .<br/>11.7.2 Web of Trust . .<br/>11.7.3 X.509 Certificates .<br/>11.8 Maplets for X.509 Certificates |
650 #0 - SUBJECT | |
Keyword | Cryptography. |
650 #0 - SUBJECT | |
Keyword | Cryptography |
General subdivision | Data processing. |
650 #0 - SUBJECT | |
Keyword | Data encryption (Computer science) |
650 #0 - SUBJECT | |
Keyword | Ciphers. |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | General Books |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Full call number | Accession number | Date last seen | Date last checked out | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|
Central Library, Sikkim University | Central Library, Sikkim University | General Book Section | 15/06/2016 | 005.8/2 KLI/C | P43939 | 20/07/2017 | 20/07/2017 | General Books |