Book description
This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. It enables students to run their own programs and develop a deep and solid understanding of the mechanics of cryptography. The author, a noted educator in the field, covers the methods, algorithms, and applications of modern cryptographic systems. He provides a highly practical learning experience by progressing at a gentle pace, keeping mathematics at a manageable level, and including numerous end-of-chapter exercises.
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Contents (1/2)
- Contents (2/2)
- Preface (1/2)
- Preface (2/2)
- Chapter 1. Introduction to cryptography (1/5)
- Chapter 1. Introduction to cryptography (2/5)
- Chapter 1. Introduction to cryptography (3/5)
- Chapter 1. Introduction to cryptography (4/5)
- Chapter 1. Introduction to cryptography (5/5)
- Chapter 2. Basic number theory (1/7)
- Chapter 2. Basic number theory (2/7)
- Chapter 2. Basic number theory (3/7)
- Chapter 2. Basic number theory (4/7)
- Chapter 2. Basic number theory (5/7)
- Chapter 2. Basic number theory (6/7)
- Chapter 2. Basic number theory (7/7)
- Chapter 3. Classical cryptosystems (1/5)
- Chapter 3. Classical cryptosystems (2/5)
- Chapter 3. Classical cryptosystems (3/5)
- Chapter 3. Classical cryptosystems (4/5)
- Chapter 3. Classical cryptosystems (5/5)
- Chapter 4. Introduction to information theory (1/3)
- Chapter 4. Introduction to information theory (2/3)
- Chapter 4. Introduction to information theory (3/3)
- Chapter 5. Public-key cryptosystems based on factoring (1/6)
- Chapter 5. Public-key cryptosystems based on factoring (2/6)
- Chapter 5. Public-key cryptosystems based on factoring (3/6)
- Chapter 5. Public-key cryptosystems based on factoring (4/6)
- Chapter 5. Public-key cryptosystems based on factoring (5/6)
- Chapter 5. Public-key cryptosystems based on factoring (6/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (1/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (2/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (3/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (4/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (5/6)
- Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (6/6)
- Chapter 7. Digital signatures (1/5)
- Chapter 7. Digital signatures (2/5)
- Chapter 7. Digital signatures (3/5)
- Chapter 7. Digital signatures (4/5)
- Chapter 7. Digital signatures (5/5)
- Chapter 8. Block ciphers and the data encryption standard (1/10)
- Chapter 8. Block ciphers and the data encryption standard (2/10)
- Chapter 8. Block ciphers and the data encryption standard (3/10)
- Chapter 8. Block ciphers and the data encryption standard (4/10)
- Chapter 8. Block ciphers and the data encryption standard (5/10)
- Chapter 8. Block ciphers and the data encryption standard (6/10)
- Chapter 8. Block ciphers and the data encryption standard (7/10)
- Chapter 8. Block ciphers and the data encryption standard (8/10)
- Chapter 8. Block ciphers and the data encryption standard (9/10)
- Chapter 8. Block ciphers and the data encryption standard (10/10)
- Chapter 9. Finite fields (1/6)
- Chapter 9. Finite fields (2/6)
- Chapter 9. Finite fields (3/6)
- Chapter 9. Finite fields (4/6)
- Chapter 9. Finite fields (5/6)
- Chapter 9. Finite fields (6/6)
- Chapter 10. The Advanced Encryption Standard (1/5)
- Chapter 10. The Advanced Encryption Standard (2/5)
- Chapter 10. The Advanced Encryption Standard (3/5)
- Chapter 10. The Advanced Encryption Standard (4/5)
- Chapter 10. The Advanced Encryption Standard (5/5)
- Chapter 11. Hash functions (1/6)
- Chapter 11. Hash functions (2/6)
- Chapter 11. Hash functions (3/6)
- Chapter 11. Hash functions (4/6)
- Chapter 11. Hash functions (5/6)
- Chapter 11. Hash functions (6/6)
- Chapter 12. Elliptic curves and cryptosystems (1/8)
- Chapter 12. Elliptic curves and cryptosystems (2/8)
- Chapter 12. Elliptic curves and cryptosystems (3/8)
- Chapter 12. Elliptic curves and cryptosystems (4/8)
- Chapter 12. Elliptic curves and cryptosystems (5/8)
- Chapter 12. Elliptic curves and cryptosystems (6/8)
- Chapter 12. Elliptic curves and cryptosystems (7/8)
- Chapter 12. Elliptic curves and cryptosystems (8/8)
- Chapter 13. Random numbers and stream ciphers (1/6)
- Chapter 13. Random numbers and stream ciphers (2/6)
- Chapter 13. Random numbers and stream ciphers (3/6)
- Chapter 13. Random numbers and stream ciphers (4/6)
- Chapter 13. Random numbers and stream ciphers (5/6)
- Chapter 13. Random numbers and stream ciphers (6/6)
- Chapter 14. Advanced applications and protocols (1/7)
- Chapter 14. Advanced applications and protocols (2/7)
- Chapter 14. Advanced applications and protocols (3/7)
- Chapter 14. Advanced applications and protocols (4/7)
- Chapter 14. Advanced applications and protocols (5/7)
- Chapter 14. Advanced applications and protocols (6/7)
- Chapter 14. Advanced applications and protocols (7/7)
- Appendix A. Introduction to Sage (1/4)
- Appendix A. Introduction to Sage (2/4)
- Appendix A. Introduction to Sage (3/4)
- Appendix A. Introduction to Sage (4/4)
- Appendix B. Advanced computational number theory (1/3)
- Appendix B. Advanced computational number theory (2/3)
- Appendix B. Advanced computational number theory (3/3)
- Bibliography (1/2)
- Bibliography (2/2)
- Back Cover
Product information
- Title: Introduction to Cryptography with Open-Source Software
- Author(s):
- Release date: April 2016
- Publisher(s): CRC Press
- ISBN: 9781439825716
You might also like
book
Cryptography and Cryptanalysis in MATLAB: Creating and Programming Advanced Algorithms
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. …
book
Securing Open Source Libraries
Open source software is amazing, but it’s also a complicated beast when it comes to ownership, …
book
Group Theoretic Cryptography
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, …
book
Pro Cryptography and Cryptanalysis with C++20: Creating and Programming Advanced Algorithms
Develop strong skills and a passion for writing cryptography algorithms and security schemes/modules using C++ 20 …