经典密码学与现代密码学
书角书背书口有磨擦和破损,内页有字迹,如图所示
¥
26
八五品
仅1件
作者斯皮尔曼
出版社清华大学出版社
出版时间2005-07
版次1
装帧平装
上书时间2024-12-26
商品详情
- 品相描述:八五品
图书标准信息
-
作者
斯皮尔曼
-
出版社
清华大学出版社
-
出版时间
2005-07
-
版次
1
-
ISBN
9787302111566
-
定价
23.00元
-
装帧
平装
-
开本
其他
-
纸张
胶版纸
-
页数
282页
- 【内容简介】
-
本书主要从三个方面来介绍密码学的知识:第一部分介绍了经典密码学的经典问题,包括单码加密法、仿射加密法、多码加密法、多图加密法和换位加密法;第二部分介绍了现代密码学,包括流加密法、块加密法和公钥加密法;第三部分介绍了密码学的未来,并对量子加密法进行了简单介绍。
本书一个突出的特点是,对密码破解进行了详细描述,使读者既掌握加密的内部算法,又能了解各种加密法的弱点。与本书配套的CAP软件(可以从www.tup.tsinghua.edu.cn下载,最新版可以从www.plu.edu/~spillrj下载)实现了各种加密法,读者可以利用该软件进行加密和解密,从而增强了本书 科学性和适用性。每章末尾还给出了一些复习题,给读者以很大的启发和想象力。
本书不仅是一本很好的密码学教材,对密码学研究人员和广大密码学爱好者也都是一本不可多得的参考用书。
- 【目录】
-
Chapter 1 Introduction to Cryptology
1.0 Introduction
1.1 Cryptography
1.2 Important Terms
1.3 Cipher Evaluation
1.4 Cryptanalysis
1.5 A Brief History of Codes and Ciphers
1.6 Classical and Contemporary Ciphers
1.7 Introduction to CAP
1.8 Summary
1.9 Important Terms
Resources
Problems
Part 1 Classical Cryptology
Chapter 2 Classical Monoalphabetic Ciphers
2.0 Introduction
2.1 Keyword Cipher
2.2 Affine Cipher
2.3 Multiliteral Cipher
2.4 Monoalphabetic Ciphers~A Short Historical View
2.5 Summary
2.6 Important Terms
Resources
Problems
Chapter 3 Classical Polyalphabetic Ciphers
3.0 Introduction
3.1 Vigenere Cipher
3.2 Autokey Cipher
3.4 Nihilist Cipher
3.5 Cylinder Cipher
3.6 Rotor ciphers
3.7 The Rise of the Machines-A Brief History
3.8 Summary
3.9 Important Terms
Resources
Problems
Chapter 4 Classical Polygraphic Ciphers
4.0 Introduction
4.1 Playfair Cipher
4.2 The Hill Cipher
4.3 Beale Ciphers-A Brief Historical Interlude
4.4 Summary
4.5 Important terms
Resources
Problems
Chapter 5 Classical Transposition Ciphers
5.0 Introduction
5.2 Permutation Cipher
5.3 Column Permutation Cipher
5.4 Double-Transposition Cipher
5.5 A Brief History of Transpositions
5.6 Summary
5.7 Important Terms
Resources
Problems
Part 2 Contemporary Ciphers
Chapter 6 Stream Ciphers
6.0 Introduction
6.1 Stream Cipher
6.2 Breaking a Stream Cipher
6.3 Other Stream-Cipher Implementations
6.4 An Unbreakable Cipher
6.5 A Practical Application
6.6 An Historical Perspective on Stream Ciphers
6.7 Summary
6.8 Important Terms
Resources
Problems
Chapter 7 Block Ciphers
7.0 Introduction
7.1 Block-Cipher Modes
7.2 Product Ciphers
7.3 Data Encryption Standard
7.4 IDEA
7.5 Advanced Encryption Standard
7.6 Using Block Ciphers
7.7 Block Ciphers' Short History
7.8 Summary
7.9 Important Terms
Resources
Problems
Chapter 8 Public Key Ciphers
8.0 Introduction
8.1 The Public Key Process
8.2 RSA
8.3 Number Theory-a very short introduction
8.4 RSA in CAP
8.5 Analysis of RSA
8.6 EIGamal Public Key System
8.7 Knapsack Cipher
8.8 Elliptic Curve Ciphers (ECC)
8.9 Public Key Applications
8.10 Historical Developments in Public Key Ciphers
8.11 Summary
8.12 Important Terms
Resources
Problems
Chapter 9 Key Management, Digital Signatures, Hash Functions,and Certificates
9.0 Introduction
9.1 Key Exchange
9.2 Authenticity
9.3 Digital Signatures
9.4 Public Key Infrastructure and Certificates
9.5 Applications
9.6 Historical Perspective
9.7 Summary
9.8 Important Terms
Resources
Problems
Part 3 The Future of Cryptology
Chapter 10 Quantum Cryptography
10.0 Introduction
10.1 Quantum Systems-A Brief Introduction
10.2 Quantum Factoring
10.3 Quantum Key Management
10.4 Summary
10.5 Important Terms
Resources
Problems
Index
点击展开
点击收起
— 没有更多了 —
以下为对购买帮助不大的评价