Cryptography: A Very Short IntroductionOUP Oxford, 2002-05-30 - 142 psl. This book is a clear and informative introduction to cryptography and data protection - subjects of considerable social and political importance. It explains what algorithms do, how they are used, the risks associated with using them, and why governments should be concerned. Important areas are highlighted, such as Stream Ciphers, block ciphers, public key algorithms, digital signatures, and applications such as e-commerce. This book highlights the explosive impact of cryptography on modern society, with, for example, the evolution of the internet and the introduction of more sophisticated banking methods. ABOUT THE SERIES: The Very Short Introductions series from Oxford University Press contains hundreds of titles in almost every subject area. These pocket-sized books are the perfect way to get ahead in a new subject quickly. Our expert authors combine facts, analysis, perspective, new ideas, and enthusiasm to make interesting and challenging topics highly readable. |
Turinys
Introduction | 1 |
Understanding Cryptography | 7 |
Historical algorithms simple examples | 18 |
Unbreakable ciphers? | 52 |
Modern algorithms | 60 |
Practical security | 75 |
Uses of cryptography | 85 |
Key management | 107 |
Cryptography in everyday life | 125 |
References andfurther reading | 135 |
139 | |
Kiti leidimai - Peržiūrėti viską
Pagrindiniai terminai ir frazės
able achieved alphabet attacker attackers authentication algorithm binary bit-string block cipher briefcase browser Caesar Cipher Chapter cipher system ciphertext block Clearly communications concept confidentiality corresponding plaintext cryptanalysis cryptogram decryption key depends determine digital signature discussed ECB mode encrypt the message encryption algorithm ensure example exhaustive key search factor Furthermore guess histogram identity illustrate important integers intercepted key distribution key management key pairs keystream keyword large number mathematical means message blocks modular arithmetic modulo node number of keys º ſa ſ obtain one-time pad padlock perfect secrecy plaintext and ciphertext plaintext block polyalphabetic cipher possible private key problem protection protocol public key cryptography public key systems public key value quantum computers reader represents secret key sequence session key shift Simple Substitution Cipher stream ciphers symmetric algorithms symmetric key Transposition Cipher trusted centre users Vigenère Cipher