Basic Methods of Cryptography
This text covers the fundamentals of cryptography, the means of establishiing security in the storage and transportation of information. With the proliferation of computer use in business, information is being communicated and processed automatically on a large scale. Medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks all process highly sensitive information. There is a growing need for the protection of information to safeguard economic interests, to prevent fraud, and to ensure privacy. In this book, the author describes the fundamentals of secure storage and transportation of information. Van der Lubbe pays particular attention to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, to methods for authentication, data integrity and digital signatures, key management, and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.
- Surveys all important current methods of cryptography
- Concise text, class tested
- Accessible level of mathematics
Reviews & endorsements
"The book does an admirable job of overviewing the fundamentals of the two-dimensional incompressible theory and provides excellent background for future study in other areas that use asymptotic methods to study the behavior of viscous fluid flows." Siam Review
"...a concise yet rather comprehensive description of current techniques...The book is clearly written and should be very accessible to any graduate student." Contemporary Physics
Product details
April 1998Paperback
9780521555593
243 pages
229 × 152 × 18 mm
0.4kg
84 b/w illus. 15 tables
Unavailable - out of print May 2013
Table of Contents
- 1. Introduction to cryptology
- 2. Classical cipher systems
- 3. The information theoretical approach
- 4. The data encryption standard
- 5. Shift-registers
- 6. Public cipher systems
- 7. Authentication and integrity
- 8. Key management and network security.