Cryptology, 2nd Edition

Book description

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.

Table of contents

  1. Cover
  2. Half Title
  3. Title Page
  4. Copyright Page
  5. Table of Contents
  6. Preface
  7. 1 Introduction to Cryptology
    1. 1.1 Basic Terminology
    2. 1.2 Cryptology in Practice
    3. 1.3 Why Study Cryptology?
  8. 2 Substitution Ciphers
    1. 2.1 Keyword Substitution Ciphers
      1. 2.1.1 Simple Keyword Substitution Ciphers
      2. 2.1.2 Keyword Columnar Substitution Ciphers
      3. 2.1.3 Exercises
    2. 2.2 Cryptanalysis of Substitution Ciphers
      1. 2.2.1 Exercises
    3. 2.3 Playfair Ciphers
      1. 2.3.1 Exercises
    4. 2.4 The Navajo Code
      1. 2.4.1 Exercises
  9. 3 Transposition Ciphers
    1. 3.1 Columnar Transposition Ciphers
      1. 3.1.1 Simple Columnar Transposition Ciphers
      2. 3.1.2 Keyword Columnar Transposition Ciphers
      3. 3.1.3 Exercises
    2. 3.2 Cryptanalysis of Transposition Ciphers
      1. 3.2.1 Cryptanalysis of Simple Columnar Ciphers
      2. 3.2.2 Cryptanalysis of Keyword Columnar Ciphers
      3. 3.2.3 Exercises
    3. 3.3 ADFGX and ADFGVX Ciphers
      1. 3.3.1 Exercises
  10. 4 The Enigma Machine
    1. 4.1 The Enigma Cipher Machine
      1. 4.1.1 Exercises
    2. 4.2 Combinatorics
      1. 4.2.1 The Multiplication Principle
      2. 4.2.2 Permutations
      3. 4.2.3 Combinations
      4. 4.2.4 Exercises
    3. 4.3 Security of the Enigma Machine
      1. 4.3.1 Number of Initial Configurations
      2. 4.3.2 Background on Cryptanalysis
      3. 4.3.3 Exercises
  11. 5 The Turing Bombe
    1. 5.1 Cribs and Menus
      1. 5.1.1 Exercises
    2. 5.2 Loops and Logical Inconsistencies
      1. 5.2.1 Exercises
    3. 5.3 Searching for the Correct Configuration
      1. 5.3.1 Exercises
    4. 5.4 The Diagonal Board
      1. 5.4.1 Exercises
    5. 5.5 The Checking Machine
      1. 5.5.1 Exercises
    6. 5.6 Turnovers
      1. 5.6.1 Exercises
    7. 5.7 Clonking
      1. 5.7.1 Exercises
    8. 5.8 Final Observations
      1. 5.8.1 Exercises
  12. 6 Shift and Affine Ciphers
    1. 6.1 Modular Arithmetic
      1. 6.1.1 Exercises
    2. 6.2 Shift Ciphers
      1. 6.2.1 Exercises
    3. 6.3 Cryptanalysis of Shift Ciphers
      1. 6.3.1 Exercises
    4. 6.4 Affine Ciphers
      1. 6.4.1 Exercises
    5. 6.5 Cryptanalysis of Affine Ciphers
      1. 6.5.1 Exercises
  13. 7 Alberti and Vigenère Ciphers
    1. 7.1 Alberti Ciphers
      1. 7.1.1 Exercises
    2. 7.2 Vigenère Ciphers
      1. 7.2.1 Vigenère Autokey Ciphers
      2. 7.2.2 Vigenère Keyword Ciphers
      3. 7.2.3 Exercises
    3. 7.3 Probability
      1. 7.3.1 Exercises
    4. 7.4 The Friedman Test
      1. 7.4.1 The Index of Coincidence
      2. 7.4.2 Estimating the Keyword Length
      3. 7.4.3 Exercises
    5. 7.5 The Kasiski Test
      1. 7.5.1 Exercises
    6. 7.6 Cryptanalysis of Vigenère Keyword Ciphers
      1. 7.6.1 Finding the Keyword Length Using Signatures
      2. 7.6.2 Finding the Keyword Letters Using Scrawls
      3. 7.6.3 Exercises
  14. 8 Hill Ciphers
    1. 8.1 Matrices
      1. 8.1.1 Definition and Basic Terminology
      2. 8.1.2 Matrix Operations
      3. 8.1.3 Identity and Inverse Matrices
      4. 8.1.4 Matrices with Modular Arithmetic
      5. 8.1.5 Exercises
    2. 8.2 Hill Ciphers
      1. 8.2.1 Exercises
    3. 8.3 Cryptanalysis of Hill Ciphers
      1. 8.3.1 Exercises
  15. 9 RSA Ciphers
    1. 9.1 Introduction to Public-Key Ciphers
      1. 9.1.1 Exercises
    2. 9.2 Introduction to RSA Ciphers
      1. 9.2.1 Exercises
    3. 9.3 The Euclidean Algorithm
      1. 9.3.1 Exercises
    4. 9.4 Modular Exponentiation
      1. 9.4.1 Exercises
    5. 9.5 ASCII
      1. 9.5.1 Exercise
    6. 9.6 RSA Ciphers
      1. 9.6.1 Exercises
    7. 9.7 Cryptanalysis of RSA Ciphers
      1. 9.7.1 Exercises
    8. 9.8 Primality Testing
      1. 9.8.1 Exercises
    9. 9.9 Integer Factorization
      1. 9.9.1 Exercises
    10. 9.10 The RSA Factoring Challenges
      1. 9.10.1 Exercises
  16. 10 ElGamal Ciphers
    1. 10.1 The Diffie-Hellman Key Exchange
      1. 10.1.1 Exercises
    2. 10.2 Discrete Logarithms
      1. 10.2.1 Exercises
    3. 10.3 ElGamal Ciphers
      1. 10.3.1 Exercises
    4. 10.4 Cryptanalysis of ElGamal Ciphers
      1. 10.4.1 Exercises
  17. 11 The Advanced Encryption Standard
    1. 11.1 Representations of Numbers
      1. 11.1.1 Binary
      2. 11.1.2 Hexadecimal
      3. 11.1.3 Exercises
    2. 11.2 Stream Ciphers
      1. 11.2.1 Exercises
    3. 11.3 AES Preliminaries
      1. 11.3.1 Plaintext Format
      2. 11.3.2 The S-Box
      3. 11.3.3 Key Format and Generation
      4. 11.3.4 Exercises
    4. 11.4 AES Encryption
      1. 11.4.1 Overview
      2. 11.4.2 The Operations
      3. 11.4.3 Exercises
    5. 11.5 AES Decryption
      1. 11.5.1 Exercises
    6. 11.6 AES Security
      1. 11.6.1 Exercises
  18. 12 Message Authentication
    1. 12.1 RSA Signatures
      1. 12.1.1 Exercises
    2. 12.2 Hash Functions
      1. 12.2.1 Exercises
    3. 12.3 RSA Signatures with Hashing
      1. 12.3.1 Exercises
    4. 12.4 The Man-in-the-Middle Attack
      1. 12.4.1 Exercises
    5. 12.5 Public-Key Infrastructures
      1. 12.5.1 Key Formation
      2. 12.5.2 Web of Trust
      3. 12.5.3 X.509 Certificates
      4. 12.5.4 Exercises
  19. Bibliography
  20. Hints and Answers for Selected Exercises
  21. Index

Product information

  • Title: Cryptology, 2nd Edition
  • Author(s): Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon
  • Release date: December 2018
  • Publisher(s): Chapman and Hall/CRC
  • ISBN: 9781351692533