This site uses cookies. Learn more about cookies.

OverDrive would like to use cookies to store information on your computer to improve your user experience at our Website. One of the cookies we use is critical for certain aspects of the site to operate and has already been set. You may delete and block all cookies from this site, but this could affect certain features or services of the site. To find out more about the cookies we use and how to delete them, click here to see our Privacy Policy.

If you do not wish to continue, please click here to exit this site.

  Main Nav

Computer Security and Cryptography

Computer Security and Cryptography

Borrow

Gain the skills and knowledge needed to create effective data security systems


This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.


The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.


Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.


Three basic types of chapters are featured to facilitate learning:



  • Chapters that develop technical skills

  • Chapters that describe a cryptosystem and present a method of analysis

  • Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions



With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

Gain the skills and knowledge needed to create effective data security systems


This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema. Most importantly, readers gain hands-on experience in cryptanalysis and learn how to create effective cryptographic systems.


The author contributed to the design and analysis of the Data Encryption Standard (DES), a widely used symmetric-key encryption algorithm. His recommendations are based on firsthand experience of what does and does not work.


Thorough in its coverage, the book starts with a discussion of the history of cryptography, including a description of the basic encryption systems and many of the cipher systems used in the twentieth century. The author then discusses the theory of symmetric- and public-key cryptography. Readers not only discover what cryptography can do to protect sensitive data, but also learn the practical limitations of the technology. The book ends with two chapters that explore a wide range of cryptography applications.


Three basic types of chapters are featured to facilitate learning:



  • Chapters that develop technical skills

  • Chapters that describe a cryptosystem and present a method of analysis

  • Chapters that describe a cryptosystem, present a method of analysis, and provide problems to test your grasp of the material and your ability to implement practical solutions



With consumers becoming increasingly wary of identity theft and companies struggling to develop safe, secure systems, this book is essential reading for professionals in e-commerce and information technology. Written by a professor who teaches cryptography, it is also ideal for students.

Available formats-
  • PDF eBook
Languages:-
Copies-
  • Available:
    1
  • Library copies:
    1
Levels-
  • ATOS:
  • Lexile:
  • Interest Level:
  • Reading Level:

Recommended for you


About the Author-
  • ALAN G. KONHEIM, PhD, is Professor Emeritus of Computer Science at the University of California, Santa Barbara. In addition to computer security, his current research interests include network performance tools, the analysis of algorithms, and the application of queuing models.

Table of Contents-
  • FOREWORD.

    PREFACE.

    ABOUT THE AUTHOR.

    CHAPTER 1: APERITIFS.

    1.1 The Lexicon of Cryptography.

    1.2 Cryptographic Systems.

    1.3 Cryptanalysis.

    1.4 Side Information.

    1.5 Thomas Jefferson and the M-94.

    1.6 Cryptography and History.

    1.7 Cryptography and Computers.

    1.8 The National Security Agency.

    1.9 The Giants.

    1.10 No Sex, Money, Crime or . . . Love.

    1.11 An Example of the Inference Process in Cryptanalysis.

    1.12 Warning!

    CHAPTER 2: COLUMNAR TRANSPOSITION.

    2.1 Shannon's Classification of Secrecy Transformations.

    2.2 The Rules of Columnar Transposition Encipherment.

    2.3 Cribbing.

    2.4 Examples of Cribbing.

    2.5 Plaintext Language Models.

    2.6 Counting k-Grams.

    2.7 Deriving the Parameters of a Markov Model from Sliding Window Counts.

    2.8 Markov Scoring.

    2.9 The ADFGVX Transposition System.

    2.10 CODA.

    2.11 Columnar Transposition Problems.

    CHAPTER 3: MONOALPHABETIC SUBSTITUTION.

    3.1 Monoalphabetic Substitution.

    3.2 Caesar's Cipher.

    3.3 Cribbing Using Isomorphs.

    3.4 The x2-Test of a Hypothesis.

    3.5 Pruning from the Table of Isomorphs.

    3.6 Partial Maximum Likelihood Estimation of a Monoalphabetic Substitution.

    3.7 The Hidden Markov Model (HMM).

    3.8 Hill Encipherment of ASCII N-Grams.

    3.9 Gaussian Elimination.

    3.10 Monoalphabetic Substitution Problems.

    CHAPTER 4: POLYALPHABETIC SUBSTITUTION.

    4.1 Running Keys.

    4.2 Blaise de Vigene're.

    4.3 Gilbert S. Vernam.

    4.4 The One-Time Pad.

    4.5 Finding the Key of Vernam-Vigene're Ciphertext with Known Period by Correlation.

    4.6 Coincidence.

    4.7 Venona.

    4.8 Polyalphabetic Substitution Problems.

    CHAPTER 5: STATISTICAL TESTS.

    5.1 Weaknesses in a Cryptosystem.

    5.2 The Kolmogorov-Smirnov Test.

    5.3 NIST's Proposed Statistical Tests.

    5.4 Diagnosis.

    5.5 Statistical Tests Problems.

    CHAPTER 6: THE EMERGENCE OF CIPHER MACHINES.

    6.1 The Rotor.

    6.2 Rotor Systems.

    6.3 Rotor Patents.

    6.4 A Characteristic Property of Conjugacy.

    6.5 Analysis of a 1-Rotor System: Ciphertext Only.

    6.6 The Displacement Sequence of a Permutation.

    6.7 Arthur Scherbius.

    6.8 Enigma Key Distribution Protocol.

    6.9 Cryptanalysis of the Enigma.

    6.10 Cribbing Enigma Ciphertext.

    6.11 The Lorenz Schlu¨sselzusatz.

    6.12 The SZ40 Pin Wheels.

    6.13 SZ40 Cryptanalysis Problems.

    6.14 Cribbing SZ40 Ciphertext.

    CHAPTER 7: THE JAPANESE CIPHER MACHINES.

    7.1 Japanese Signaling Conventions.

    7.2 Half-Rotors.

    7.3 Components of the RED Machine.

    7.4 Cribbing RED Ciphertext.

    7.5 Generalized Vowels and Consonants.

    7.6 "Climb Mount Itaka" - War!

    7.7 Components of the PURPLE Machine.

    7.8 The PURPLE Keys.

    7.9 Cribbing PURPLE: Finding the V-Stepper.

    7.10 Cribbing PURPLE: Finding the C-Steppers.

    CHAPTER 8: STREAM CIPHERS.

    8.1 Stream Ciphers.

    8.2 Feedback Shift Registers.

    8.3 The Algebra of Polynomials over Z2.

    8.4 The Characteristic Polynomial of a Linear Feedback Shift Register.

    8.5 Properties of Maximal Length LFSR Sequences.

    8.6 Linear Equivalence.

    8.7 Combining Multiple Linear Feedback Shift Registers.

    8.8 Matrix Representation of the LFSR.

    8.9 Cribbing of Stream Enciphered ASCII Plaintext.

    8.10 Nonlinear Feedback Shift Registers.

    8.11 Nonlinear Key Stream Generation.

    8.12 Irregular Clocking.

    8.13 RC4.

    8.14 Stream Encipherment Problems.

    CHAPTER 9: BLOCK-CIPHERS: LUCIFER, DES, AND AES.

    9.1 LUCIFER.

    9.2 DES.

    9.3 The DES S-Boxes, P-Box, and Initial Permutation (IP).

    9.4 DES Key Schedule.

    9.5 Sample DES Encipherment.

    9.6 Chaining.

    9.7 Is DES a Random Mapping?

    9.8 DES in the Output-Feedback Mode (OFB).

    9.9 Cryptanalysis of DES.

    9.10...

Reviews-
  • IEEE Computer Magazine, March 2007

    "...essential reading for professionals in e-commerce and information technology...it is also ideal for students."

Title Information+
  • Publisher
    Wiley
  • PDF eBook
    Release date:
Digital Rights Information+
  • Copyright Protection (DRM) required by the Publisher may be applied to this title to limit or prohibit printing or copying. File sharing or redistribution is prohibited. Your rights to access this material expire at the end of the lending period. Please see Important Notice about Copyrighted Materials for terms applicable to this content.

Status bar:

You've reached your checkout limit.

Visit your Bookshelf to manage your titles.

×

You already have this title checked out.

Want to go to your Bookshelf?

×

Recommendation Limit Reached.

You have reached the maximum number of titles you are permitted to recommend at this time.

×

Sign in to recommend this title.

Recommend your library consider adding this title to the Digital Collection.

×
×

Limited availability

Availability can change throughout the month based on the library's budget.

is available for days.

Once playback starts, you have hours to view the title.

×

Permissions

×

×

NOTE: Barnes and Noble® may change this list of devices at any time.

×
Buy it now
and help our library WIN!
Computer Security and Cryptography
Alan G. Konheim
Choose a retail partner below to buy this title for yourself.
A portion of this purchase goes to support your library.
Clicking on the 'Buy It Now' link will cause you to leave the library download platform website. The content of the retail website is not controlled by the library. Please be aware that the website does not have the same privacy policy as the library or its service providers.
×
×

There are no copies of this issue left to borrow. Please try to borrow this title again when a new issue is released.

×
|   Sign In

You will be prompted to sign into your library account on the next page.

If this is your first time selecting “Send to NOOK,” you will then be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."

The first time you select “Send to NOOK,” you will be taken to a Barnes & Noble page to sign into (or create) your NOOK account. You should only have to sign into your NOOK account once to link it to your library account. After this one-time step, periodicals will be automatically sent to your NOOK account when you select "Send to NOOK."

You can read periodicals on any NOOK tablet or in the free NOOK reading app for iOS, Android or Windows 8.

Accept to ContinueCancel