Book description
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required
Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.
The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.
- Concisely explains complex formulas and equations and makes the math easy
- Teaches even the information security novice critical encryption skills
- Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Author
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
-
PART I Foundations
- CHAPTER 1 History of Cryptography to the 1800s
- CHAPTER 2 History of Cryptography from the 1800s
- CHAPTER 3 Basic Information Theory
- CHAPTER 4 Essential Number Theory and Discrete Math
- CHAPTER 5 Essential Algebra
-
PART II Symmetric Ciphers and Hashes
- CHAPTER 6 Feistel Networks
- CHAPTER 7 Substitution-Permutation Networks
- CHAPTER 8 S-Box Design
- CHAPTER 9 Cryptographic Hashes
- PART III Asymmetric Ciphers
-
PART IV Applications
- CHAPTER 12 Random Number Generators
- CHAPTER 13 Secure Sockets Layer/Transport Layer Security Protocol
- CHAPTER 14 Virtual Private Networks
- CHAPTER 15 Military Applications
- CHAPTER 16 Steganography
- CHAPTER 17 Cryptanalysis
- CHAPTER 18 Cryptographic Backdoors
- CHAPTER 19 The Future of Cryptography
- APPENDIX Implementing Cryptography
- Index
Product information
- Title: Modern Cryptography: Applied Mathematics for Encryption and Information Security
- Author(s):
- Release date: October 2015
- Publisher(s): McGraw-Hill
- ISBN: 9781259588099
You might also like
book
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the …
book
Demystifying Cryptography with OpenSSL 3.0
Use OpenSSL to add security features to your application, including cryptographically strong symmetric and asymmetric encryption, …
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …
book
Express Learning: Cryptography and Network Security
Express Learning is a series of books designed as quick reference guides to important undergraduate computer …