Book Details

Instructors may access teaching resources by clicking the ‘Request Instructor Resources’ tab next to the title.
Please note that you can subscribe to a maximum of 2 titles.

Introduction to Cryptography With Coding Theory, 2/e


Introduction to Cryptography With Coding Theory, 2/e
Author(s)  Simy Joy ,Payal Anand ,Priya Nair Rajeev
ISBN  9788131714768
Imprint  Pearson Education
Copyright  2007
Pages  592
Binding  Paperback
List Price  Rs. 990.00
  
 
 

With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest significant advancements in the field.
  • Contents
  • Features
  • Downloadable Resources

  1. Overview
  2. Classical Cryptosystems.
  3. Basic Number Theory.
  4. The Data Encryption Standard
  5. AES: Rijndael

  6. The RSA Algorithm

  7. Discrete Logarithms

  8. Hash Functions
  9. Digital Signatures
  10. Security Protocols
  11. Digital Cash
  12. Secret Sharing Schemes
  13. Games

  14. Zero-Knowledge Techniques

  15. Information Theory

  16. Elliptic Curves

  17. Lattice Methods

  18. Error Correcting Codes

  19. Quantum Techniques in Cryptography

  • Bibliography

  • Index
 

  • Balances applied and theoretical aspects of security — Presents applications and protocols where cryptographic primitives are used in practice, such as SET and SSL.

  • Coverage of Rijndael and AES — Provides a detailed explanation of AES, which has replaced Feistel-based ciphers (DES) as the standard block cipher algorithm.

  • Coverage of practical applications of cryptography to security protocols — Connects the cryptographic tools developed earlier in the book to the building of real security tools, demonstrating to students that there is more to security and cryptography than just math.
  • Friendly, story-like discussion of security concepts — Uses historical examples to illustrate the concepts of security and cryptanalysis by relating theory to easier-to-grasp events.

  • Modern methods such as Elliptic curves, Lattice methods, and Quantum Techniques — Provides thorough coverage of topics that are becoming increasingly prominent in the field.
  • Major coverage of coding theory — Offers a discussion of coding theory, which is often covered in today’s cryptology courses.

  • Numerous example calculations — Includes many examples, especially in purely mathematical chapters such as Ch. 3.
  • Public key certificate — Provides an example of what an actual public key certificate looks like, rather than just describing it.

  • Mathematica/Maple/Matlab problems and notebooks — Allow students to work with realistic sized examples in RSA and Digital Signatures, as well as classical cryptosystems and those with elliptic curves.
  • Practical examples and applications — Give students hands-on experience with the large-numbered cryptography of today’s security systems, and provides a discussion of security protocols.
 
 
Username/ Email  
Password  
If you are new to this site, and you do not have a username and password, please register.