This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. In all these cases there is a growing need for the protection of information to safeguard economic interests, to prevent fraud and to ensure privacy. In this book, the fundamentals of secure storage and transportation of information are described. Among other things, attention is given to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, which are suitable for data security, to methods for authentication, data integrity and digital signatures, key management and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.
Rezensionen / Stimmen
'... was captivated reading it. The book is clearly written and should be very accessible to any graduate student, although I would ... slightly more formal and precise mathematical style.' H. Inamori, Contemporary Physics
Sprache
Verlagsort
Zielgruppe
Für höhere Schule und Studium
Für Beruf und Forschung
Illustrationen
15 Tables, unspecified; 1 Halftones, unspecified; 83 Line drawings, unspecified
Maße
Höhe: 236 mm
Breite: 159 mm
Dicke: 22 mm
Gewicht
ISBN-13
978-0-521-55480-0 (9780521554800)
Copyright in bibliographic data is held by Nielsen Book Services Limited or its licensors: all rights reserved.
Schweitzer Klassifikation
Autor*in
Technische Universiteit Delft, The Netherlands
Übersetzung
1. Introduction to cryptology; 2. Classical cipher systems; 3. The information theoretical approach; 4. The data encryption standard; 5. Shift-registers; 6. Public cipher systems; 7. Authentication and integrity; 8. Key management and network security.