Introduction to Cryptography with Open-Source Software

Book description

Once the privilege of a secret few, cryptography is now taught at universities around the world. Introduction to Cryptography with Open-Source Software illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. The author, a noted educator in the field, provides a highly practical learning experienc

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Contents (1/2)
  4. Contents (2/2)
  5. Preface (1/2)
  6. Preface (2/2)
  7. Chapter 1. Introduction to cryptography (1/5)
  8. Chapter 1. Introduction to cryptography (2/5)
  9. Chapter 1. Introduction to cryptography (3/5)
  10. Chapter 1. Introduction to cryptography (4/5)
  11. Chapter 1. Introduction to cryptography (5/5)
  12. Chapter 2. Basic number theory (1/7)
  13. Chapter 2. Basic number theory (2/7)
  14. Chapter 2. Basic number theory (3/7)
  15. Chapter 2. Basic number theory (4/7)
  16. Chapter 2. Basic number theory (5/7)
  17. Chapter 2. Basic number theory (6/7)
  18. Chapter 2. Basic number theory (7/7)
  19. Chapter 3. Classical cryptosystems (1/5)
  20. Chapter 3. Classical cryptosystems (2/5)
  21. Chapter 3. Classical cryptosystems (3/5)
  22. Chapter 3. Classical cryptosystems (4/5)
  23. Chapter 3. Classical cryptosystems (5/5)
  24. Chapter 4. Introduction to information theory (1/3)
  25. Chapter 4. Introduction to information theory (2/3)
  26. Chapter 4. Introduction to information theory (3/3)
  27. Chapter 5. Public-key cryptosystems based on factoring (1/6)
  28. Chapter 5. Public-key cryptosystems based on factoring (2/6)
  29. Chapter 5. Public-key cryptosystems based on factoring (3/6)
  30. Chapter 5. Public-key cryptosystems based on factoring (4/6)
  31. Chapter 5. Public-key cryptosystems based on factoring (5/6)
  32. Chapter 5. Public-key cryptosystems based on factoring (6/6)
  33. Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (1/6)
  34. Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (2/6)
  35. Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (3/6)
  36. Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (4/6)
  37. Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (5/6)
  38. Chapter 6. Public-key cryptosystems based on logarithms and knapsacks (6/6)
  39. Chapter 7. Digital signatures (1/5)
  40. Chapter 7. Digital signatures (2/5)
  41. Chapter 7. Digital signatures (3/5)
  42. Chapter 7. Digital signatures (4/5)
  43. Chapter 7. Digital signatures (5/5)
  44. Chapter 8. Block ciphers and the data encryption standard (1/10)
  45. Chapter 8. Block ciphers and the data encryption standard (2/10)
  46. Chapter 8. Block ciphers and the data encryption standard (3/10)
  47. Chapter 8. Block ciphers and the data encryption standard (4/10)
  48. Chapter 8. Block ciphers and the data encryption standard (5/10)
  49. Chapter 8. Block ciphers and the data encryption standard (6/10)
  50. Chapter 8. Block ciphers and the data encryption standard (7/10)
  51. Chapter 8. Block ciphers and the data encryption standard (8/10)
  52. Chapter 8. Block ciphers and the data encryption standard (9/10)
  53. Chapter 8. Block ciphers and the data encryption standard (10/10)
  54. Chapter 9. Finite fields (1/6)
  55. Chapter 9. Finite fields (2/6)
  56. Chapter 9. Finite fields (3/6)
  57. Chapter 9. Finite fields (4/6)
  58. Chapter 9. Finite fields (5/6)
  59. Chapter 9. Finite fields (6/6)
  60. Chapter 10. The Advanced Encryption Standard (1/5)
  61. Chapter 10. The Advanced Encryption Standard (2/5)
  62. Chapter 10. The Advanced Encryption Standard (3/5)
  63. Chapter 10. The Advanced Encryption Standard (4/5)
  64. Chapter 10. The Advanced Encryption Standard (5/5)
  65. Chapter 11. Hash functions (1/6)
  66. Chapter 11. Hash functions (2/6)
  67. Chapter 11. Hash functions (3/6)
  68. Chapter 11. Hash functions (4/6)
  69. Chapter 11. Hash functions (5/6)
  70. Chapter 11. Hash functions (6/6)
  71. Chapter 12. Elliptic curves and cryptosystems (1/8)
  72. Chapter 12. Elliptic curves and cryptosystems (2/8)
  73. Chapter 12. Elliptic curves and cryptosystems (3/8)
  74. Chapter 12. Elliptic curves and cryptosystems (4/8)
  75. Chapter 12. Elliptic curves and cryptosystems (5/8)
  76. Chapter 12. Elliptic curves and cryptosystems (6/8)
  77. Chapter 12. Elliptic curves and cryptosystems (7/8)
  78. Chapter 12. Elliptic curves and cryptosystems (8/8)
  79. Chapter 13. Random numbers and stream ciphers (1/6)
  80. Chapter 13. Random numbers and stream ciphers (2/6)
  81. Chapter 13. Random numbers and stream ciphers (3/6)
  82. Chapter 13. Random numbers and stream ciphers (4/6)
  83. Chapter 13. Random numbers and stream ciphers (5/6)
  84. Chapter 13. Random numbers and stream ciphers (6/6)
  85. Chapter 14. Advanced applications and protocols (1/7)
  86. Chapter 14. Advanced applications and protocols (2/7)
  87. Chapter 14. Advanced applications and protocols (3/7)
  88. Chapter 14. Advanced applications and protocols (4/7)
  89. Chapter 14. Advanced applications and protocols (5/7)
  90. Chapter 14. Advanced applications and protocols (6/7)
  91. Chapter 14. Advanced applications and protocols (7/7)
  92. Appendix A. Introduction to Sage (1/4)
  93. Appendix A. Introduction to Sage (2/4)
  94. Appendix A. Introduction to Sage (3/4)
  95. Appendix A. Introduction to Sage (4/4)
  96. Appendix B. Advanced computational number theory (1/3)
  97. Appendix B. Advanced computational number theory (2/3)
  98. Appendix B. Advanced computational number theory (3/3)
  99. Bibliography (1/2)
  100. Bibliography (2/2)
  101. Back Cover

Product information

  • Title: Introduction to Cryptography with Open-Source Software
  • Author(s): Alasdair McAndrew
  • Release date: April 2016
  • Publisher(s): CRC Press
  • ISBN: 9781439825716