Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
This textbook provides an introduction to the mathematics on which modern cryptology is based. It covers not only public key cryptography, the glamorous component of modern cryptology, but also pays considerable attention to secret key cryptography, its workhorse in practice.
Modern cryptology has been described as the science of the integrity of information, covering all aspects like confidentiality, authenticity and non-repudiation and also including the protocols required for achieving these aims. In both theory and practice it requires notions and constructions from three major disciplines: computer science, electronic engineering and mathematics. Within mathematics, group theory, the theory of finite fields, and elementary number theory as well as some topics not normally covered in courses in algebra, such as the theory of Boolean functions and Shannon theory, are involved.
"Cryptography is technically synonymous with information security. Providing security features for data and information is the most important concern in a business requirement. . this book provides rich mathematical treatment of cryptographic algorithms in a simplified way. . This book presents nice and valuable material for students, researchers, and practitioners working in the field of information security." (S. Ramakrishnan, Computing Reviews, March, 2017)
"The present book consolidates the mathematics these students need to know into a single volume and will help them greatly. Initially, this reviewer believed that the book would be mostly redundant for mathematics majors, but as he read further, he found that it could serve as a valuable supplement within a math course. . Summing Up: Highly recommended. Upper-division undergraduates and above; faculty and professionals." (C. Bauer, Choice, Vol. 54 (7), March, 2017)
"This book introduces the basic algebra used in modern cryptology. It is mainly addressed to computer scientists and engineers entering the field of mathematical cryptology, but it may also be used as an introduction to algebra and elementary number theory with emphasis on application in cryptology for undergraduate students in computer science, engineering and also mathematics. The book is easily accessible, enjoyable to read, and essentially self-contained." (Wilfried Meidl, zbMATH 1364.94005, 2017)
"First, the text also covers number theory and also introduces information theory and coding theory. This material is of course algebraic in nature, but does go beyond what one typically expects to see in a book . that is advertised as a text in algebra. Second, the book not only discusses these topics but actually shows how they are used in the study of cryptography. . this book might definitely have some appeal as a prospective text." (Mark Hunacek, MAA Reviews, December, 2016)
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.