Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Image from Google Jackets

Cryptography primer : secrets and promises / Philip N. Klein.

By: Material type: TextTextPublication details: New York : Cambridge University Press, 2014.Description: xiii, 174 p. : illustrations ; 23 cmISBN:
  • 9781107017887 (hardback)
Subject(s): DDC classification:
  • 005.82 23 K64
Contents:
1. Introduction; 2. Modular arithmetic; 3. The addition cypher, an insecure block cypher; 4. Functions; 5. Probability theory; 6. Perfect secrecy and perfectly secure cryptosystems; 7. Number theory; 8. Euclid's algorithm; 9. Some uses of perfect secrecy; 10. Computational problems, easy and hard; 11. Modular exponentiation, modular logarithm, and one-way functions; 12. Diffie and Hellman's exponential-key-agreement protocol; 13. Computationally secure single-key cryptosystems; 14. Public-key cryptosystems and digital signatures; Further reading; Index.
Summary: Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books ISI Library, Kolkata 005.82 K64 (Browse shelf(Opens below)) Available 136659
Total holds: 0

Includes bibliographical references and index.

1. Introduction;
2. Modular arithmetic;
3. The addition cypher, an insecure block cypher;
4. Functions;
5. Probability theory;
6. Perfect secrecy and perfectly secure cryptosystems;
7. Number theory;
8. Euclid's algorithm;
9. Some uses of perfect secrecy;
10. Computational problems, easy and hard;
11. Modular exponentiation, modular logarithm, and one-way functions;
12. Diffie and Hellman's exponential-key-agreement protocol; 13. Computationally secure single-key cryptosystems;
14. Public-key cryptosystems and digital signatures;
Further reading;
Index.

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.

There are no comments on this title.

to post a comment.
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in