## Book description

Cryptology: Classical and Modern, Second Edition proficiently introduces readers to the fascinating field of cryptology. The book covers classical methods including substitution, transposition, Playfair, ADFGVX, Alberti, Vigene re, and Hill ciphers.

1. Cover
2. Half Title
3. Title Page
6. Preface
7. 1 Introduction to Cryptology
8. 2 Substitution Ciphers
1. 2.1 Keyword Substitution Ciphers
2. 2.2 Cryptanalysis of Substitution Ciphers
3. 2.3 Playfair Ciphers
4. 2.4 The Navajo Code
9. 3 Transposition Ciphers
1. 3.1 Columnar Transposition Ciphers
2. 3.2 Cryptanalysis of Transposition Ciphers
10. 4 The Enigma Machine
1. 4.1 The Enigma Cipher Machine
2. 4.2 Combinatorics
3. 4.3 Security of the Enigma Machine
11. 5 The Turing Bombe
2. 5.2 Loops and Logical Inconsistencies
3. 5.3 Searching for the Correct Configuration
4. 5.4 The Diagonal Board
5. 5.5 The Checking Machine
6. 5.6 Turnovers
7. 5.7 Clonking
8. 5.8 Final Observations
12. 6 Shift and Affine Ciphers
1. 6.1 Modular Arithmetic
2. 6.2 Shift Ciphers
3. 6.3 Cryptanalysis of Shift Ciphers
4. 6.4 Affine Ciphers
5. 6.5 Cryptanalysis of Affine Ciphers
13. 7 Alberti and Vigenère Ciphers
1. 7.1 Alberti Ciphers
2. 7.2 Vigenère Ciphers
3. 7.3 Probability
4. 7.4 The Friedman Test
5. 7.5 The Kasiski Test
6. 7.6 Cryptanalysis of Vigenère Keyword Ciphers
14. 8 Hill Ciphers
1. 8.1 Matrices
2. 8.2 Hill Ciphers
3. 8.3 Cryptanalysis of Hill Ciphers
15. 9 RSA Ciphers
1. 9.1 Introduction to Public-Key Ciphers
2. 9.2 Introduction to RSA Ciphers
3. 9.3 The Euclidean Algorithm
4. 9.4 Modular Exponentiation
5. 9.5 ASCII
6. 9.6 RSA Ciphers
7. 9.7 Cryptanalysis of RSA Ciphers
8. 9.8 Primality Testing
9. 9.9 Integer Factorization
10. 9.10 The RSA Factoring Challenges
16. 10 ElGamal Ciphers
1. 10.1 The Diffie-Hellman Key Exchange
2. 10.2 Discrete Logarithms
3. 10.3 ElGamal Ciphers
4. 10.4 Cryptanalysis of ElGamal Ciphers
17. 11 The Advanced Encryption Standard
1. 11.1 Representations of Numbers
2. 11.2 Stream Ciphers
3. 11.3 AES Preliminaries
4. 11.4 AES Encryption
5. 11.5 AES Decryption
6. 11.6 AES Security
18. 12 Message Authentication
1. 12.1 RSA Signatures
2. 12.2 Hash Functions
3. 12.3 RSA Signatures with Hashing
4. 12.4 The Man-in-the-Middle Attack
5. 12.5 Public-Key Infrastructures
19. Bibliography
20. Hints and Answers for Selected Exercises
21. Index

## Product information

• Title: Cryptology, 2nd Edition
• Author(s): Richard E. Klima, Richard Klima, Neil P. Sigmon, Neil Sigmon
• Release date: December 2018
• Publisher(s): Chapman and Hall/CRC
• ISBN: 9781351692533