Book description
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required
Cryptography underpins today’s cybersecurity; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.
The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of realworld applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.
 Concisely explains complex formulas and equations and makes the math easy
 Teaches even the information security novice critical encryption skills
 Written by a globallyrecognized security expert who has taught cryptography to various government and civilian groups and organizations around the world
Table of contents
 Cover
 Title Page
 Copyright Page
 Dedication
 About the Author
 Contents at a Glance
 Contents
 Acknowledgments
 Introduction

PART I Foundations
 CHAPTER 1 History of Cryptography to the 1800s
 CHAPTER 2 History of Cryptography from the 1800s
 CHAPTER 3 Basic Information Theory
 CHAPTER 4 Essential Number Theory and Discrete Math
 CHAPTER 5 Essential Algebra

PART II Symmetric Ciphers and Hashes
 CHAPTER 6 Feistel Networks
 CHAPTER 7 SubstitutionPermutation Networks
 CHAPTER 8 SBox Design
 CHAPTER 9 Cryptographic Hashes
 PART III Asymmetric Ciphers

PART IV Applications
 CHAPTER 12 Random Number Generators
 CHAPTER 13 Secure Sockets Layer/Transport Layer Security Protocol
 CHAPTER 14 Virtual Private Networks
 CHAPTER 15 Military Applications
 CHAPTER 16 Steganography
 CHAPTER 17 Cryptanalysis
 CHAPTER 18 Cryptographic Backdoors
 CHAPTER 19 The Future of Cryptography
 APPENDIX Implementing Cryptography
 Index
Product information
 Title: Modern Cryptography: Applied Mathematics for Encryption and Information Security
 Author(s):
 Release date: October 2015
 Publisher(s): McGrawHill
 ISBN: 9781259588099
You might also like
book
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the …
book
Demystifying Cryptography with OpenSSL 3.0
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, …
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …
book
Express Learning: Cryptography and Network Security
Express Learning is a series of books designed as quick reference guides to important undergraduate computer …