Konheim, Alan G., 1934-

Computer security and cryptography / Alan G. Konheim. - Hoboken, N.J. : Wiley-Interscience, �2007. - 1 online resource (xvii, 521 pages) : illustrations

Includes bibliographical references and index.

COMPUTER SECURITY AND CRYPTOGRAPHY; CONTENTS; FOREWORD; PREFACE; ABOUT THE AUTHOR; CHAPTER 1 APERITIFS; CHAPTER 2 COLUMNAR TRANSPOSITION; CHAPTER 3 MONOALPHABETIC SUBSTITUTION; CHAPTER 4 POLYALPHABETIC SUBSTITUTION; CHAPTER 5 STATISTICAL TESTS; CHAPTER 6 THE EMERGENCE OF CIPHER MACHINES; CHAPTER 7 THE JAPANESE CIPHER MACHINES; CHAPTER 8 STREAM CIPHERS; CHAPTER 9 BLOCK-CIPHERS: LUCIFER, DES, AND AES; CHAPTER 10 THE PARADIGM OF PUBLIC KEY CRYPTOGRAPHY; CHAPTER 11 THE KNAPSACK CRYPTOSYSTEM; CHAPTER 12 THE RSA CRYPTOSYSTEM; CHAPTER 13 PRIME NUMBERS AND FACTORIZATION.

Gain the skills and knowledge needed to create effective data security systems. This book updates readers with all the tools, techniques, and concepts needed to understand and implement data security systems. It presents a wide range of topics for a thorough understanding of the factors that affect the efficiency of secrecy, authentication, and digital signature schema.

9780470083970 0470083972 9780470083987 0470083980

10.1002/0470083980 doi 9780471947837

24307C36-99BB-4A76-9317-7D1A7CC786FB OverDrive, Inc. http://www.overdrive.com

GBA697026 bnb

Uk


Computer security.
Cryptography.
Computer Security
S�ecurit�e informatique.
Cryptographie.
COMPUTERS--Internet--Security.
COMPUTERS--Networking--Security.
COMPUTERS--Security--General.
Computer security
Cryptography

QA76.9.A25 / K638 2007eb

005.8