Understanding and Applying Cryptography and Data Security
Autor Adam J. Elbirten Limba Engleză Hardback – 9 apr 2009
Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses.
Provides the Foundation for Constructing Cryptographic Protocols. The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encryption Standard (AES). Subsequent chapters on public-key cryptographic algorithms cover the underlying mathematics behind the computation of inverses, the use of fast exponentiation techniques, tradeoffs between public- and symmetric-key algorithms, and the minimum key lengths necessary to maintain acceptable levels of security. The final chapters present the components needed for the creation of cryptographic protocols and investigate different security services and their impact on the construction of cryptographic protocols.
Offers Implementation Comparisons . By examining tradeoffs between code size, hardware logic resource requirements, memory usage, speed and throughput, power consumption, and more, this textbook provides students with a feel for what they may encounter in actual job situations.
A solutions manual is available to qualified instructors with course adoptions.
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (1) | 339.32 lei 43-57 zile | |
CRC Press – 23 oct 2019 | 339.32 lei 43-57 zile | |
Hardback (1) | 688.15 lei 43-57 zile | |
CRC Press – 9 apr 2009 | 688.15 lei 43-57 zile |
Preț: 688.15 lei
Preț vechi: 989.90 lei
-30% Nou
Puncte Express: 1032
Preț estimativ în valută:
131.70€ • 136.80$ • 109.39£
131.70€ • 136.80$ • 109.39£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781420061604
ISBN-10: 1420061607
Pagini: 666
Ilustrații: 65 b/w images, 24 tables and 50 equations
Dimensiuni: 156 x 234 x 36 mm
Greutate: 1.39 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
ISBN-10: 1420061607
Pagini: 666
Ilustrații: 65 b/w images, 24 tables and 50 equations
Dimensiuni: 156 x 234 x 36 mm
Greutate: 1.39 kg
Ediția:1
Editura: CRC Press
Colecția Auerbach Publications
Public țintă
Academic, Professional Practice & Development, and UndergraduateCuprins
Introduction. Symmetric-Key Cryptography. Symmetric-Key Cryptography: Substitution Ciphers. Symmetric-Key Cryptography: Stream Ciphers. Symmetric-Key Cryptography: Block Ciphers. Public-Key Cryptography. Public-Key Cryptography: RSA. Public-Key Cryptography: Discrete Logarithms. Public-Key Cryptography: Elliptic Curves. Cryptographic Components. Cryptographic Protocols. References. Index.
Recenzii
This book is a good technical reference for someone who wishes to implement (or install) a security system based on existing techniques … a good complementary book for a technical course to students who already know about the theory of cryptography but need to learn the technical details in order to implement existing protocols in new hardware.
—Jeremy Barbay, University of Chile, in SIGACT NEWS, December 2011
—Jeremy Barbay, University of Chile, in SIGACT NEWS, December 2011
Descriere
Addressing real-world implementation issues, this text emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. It focuses on cryptographic algorithms, such as symmetric- and public-key, before dealing with construction of cryptographic protocols. The author examines tradeoffs between code size, hardware logic requirements, memory usage, speed, power consumption, and more. He includes examples and problems to evaluate implementation results of several software and hardware languages and provides C and VHDL frameworks and testing environments on CD-ROM. A solutions manual is available with qualifying course adoption.