Book description
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required
Cryptography underpins today’s cybersecurity; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.
The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of realworld applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.
 Concisely explains complex formulas and equations and makes the math easy
 Teaches even the information security novice critical encryption skills
 Written by a globallyrecognized security expert who has taught cryptography to various government and civilian groups and organizations around the world
Table of contents
 Cover
 Title Page
 Copyright Page
 Dedication
 About the Author
 Contents at a Glance
 Contents
 Acknowledgments
 Introduction

PART I Foundations
 CHAPTER 1 History of Cryptography to the 1800s
 CHAPTER 2 History of Cryptography from the 1800s
 CHAPTER 3 Basic Information Theory
 CHAPTER 4 Essential Number Theory and Discrete Math
 CHAPTER 5 Essential Algebra

PART II Symmetric Ciphers and Hashes
 CHAPTER 6 Feistel Networks
 CHAPTER 7 SubstitutionPermutation Networks
 CHAPTER 8 SBox Design
 CHAPTER 9 Cryptographic Hashes
 PART III Asymmetric Ciphers

PART IV Applications
 CHAPTER 12 Random Number Generators
 CHAPTER 13 Secure Sockets Layer/Transport Layer Security Protocol
 CHAPTER 14 Virtual Private Networks
 CHAPTER 15 Military Applications
 CHAPTER 16 Steganography
 CHAPTER 17 Cryptanalysis
 CHAPTER 18 Cryptographic Backdoors
 CHAPTER 19 The Future of Cryptography
 APPENDIX Implementing Cryptography
 Index
Product information
 Title: Modern Cryptography: Applied Mathematics for Encryption and Information Security
 Author(s):
 Release date: October 2015
 Publisher(s): McGrawHill
 ISBN: 9781259588099
You might also like
book
RealWorld Cryptography
An allpractical guide to the cryptography behind common tools and protocols that will help you make …
book
Serious Cryptography
"This practical guide to modern encryption breaks down the fundamental mathematical concepts at the heart of …
book
Mastering Linux Security and Hardening  Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …
book
Implementing SSL/TLS Using Cryptography and PKI
Handson, practical guide to implementing SSL and TLS protocols for Internet security If you are a …