Import It All
Books > Computers & Technology > Networking & Cloud Computing > Network Security
Cryptography: Theory and Practice (Chapman & Hall/CRC Cryptography and Network Security Series)

Cryptography: Theory and Practice (Chapman & Hall/CRC Cryptography and Network Security Series)

Product ID: 114462026 Condition: New

Payflex: Pay in 4 interest-free payments of R614.50. Learn more
R 2,458
includes Duties & VAT
Delivery: 10-20 working days
Ships from USA warehouse.
Secure Transaction
VISA Mastercard payflex ozow

Product Description

Cryptography: Theory and Practice (Chapman & Hall/CRC Cryptography and Network Security Series)

<P>Through three editions, <B><I>Cryptography: Theory and Practice</B></I>, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.</P> <P>The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.</P> <P><B>Key Features of the Fourth Edition:</P> <UL></B> <P> <LI>New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).</LI> <P></P> <P> <LI>New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).</LI> <P></P> <P> <LI>New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).</LI> <P></P> <P> <LI>An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.</LI> <P></P> <P> <LI>Interesting attacks on cryptosystems, including:</LI> <P></P> <UL> <P> <LI>padding oracle attack</LI> <P></P> <P> <LI>correlation attacks and algebraic attacks on stream ciphers</LI> <P></P> <P> <LI>attack on the DUAL-EC random bit generator that makes use of a trapdoor.</LI> <P></P></UL> <P> <LI>A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.</LI> <P></P> <P> <LI>Methods of key distribution in sensor networks.</LI> <P></P> <P> <LI>The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.</LI> <P></P> <P> <LI>The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.</LI> <P></P> <P> <LI>The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.</LI> <P></P></UL>

Technical Specifications

Country
USA
Brand
CRC Press
Manufacturer
Chapman and Hall/CRC
Binding
Hardcover
ItemPartNumber
34172162
ReleaseDate
2018-09-11T00:00:01Z
UnitCount
1
EANs
9781138197015

You might also like

Back to top