000 02818nam a22004098i 4500
001 CR9781139084772
005 20250919142045.0
006 m|||||o||d||||||||
007 cr||||||||||||
008 110509s2014||||enk o ||1 0|eng|d
020 _a9781139084772 (ebook)
020 _z9781107017887 (hardback)
020 _z9781107603455 (paperback)
040 _aUkCbUP
_beng
_erda
_cUkCbUP
050 0 0 _aQA76.9.A25
_bK557 2014
082 0 0 _a005.8/2
_223
100 1 _aKlein, Philip N.,
_eauthor.
245 1 2 _aA cryptography primer :
_bsecrets and promises /
_cPhilip N. Klein, Brown University, Providence, Rhode Island.
264 1 _aCambridge :
_bCambridge University Press,
_c2014.
300 _a1 online resource (xiii, 174 pages) :
_bdigital, PDF file(s).
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
500 _aTitle from publisher's bibliographic system (viewed on 05 Oct 2015).
505 8 _aMachine generated contents note: 1. Introduction; 2. Modular arithmetic; 3. The addition cypher, an insecure block cypher; 4. Functions; 5. Probability theory; 6. Perfect secrecy and perfectly secure cryptosystems; 7. Number theory; 8. Euclid's algorithm; 9. Some uses of perfect secrecy; 10. Computational problems, easy and hard; 11. Modular exponentiation, modular logarithm, and one-way functions; 12. Diffie and Hellman's exponential-key-agreement protocol; 13. Computationally secure single-key cryptosystems; 14. Public-key cryptosystems and digital signatures.
520 _aCryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.
650 0 _aComputer security.
650 0 _aData encryption (Computer science)
650 0 _aDigital signatures.
650 0 _aTelecommunication
_xSafety measures.
776 0 8 _iPrint version:
_z9781107017887
856 4 0 _uhttps://doi.org/10.1017/CBO9781139084772
907 _a.b16845882
_b2020-12-22
_c2020-12-22
942 _n0
998 _a1
_b2020-12-22
_cm
_da
_feng
_genk
_y0
_z.b16845882
999 _c651931
_d651931