Modern Cryptography: Applied Mathematics for Encryption and Information Security

Modern Cryptography: Applied Mathematics for Encryption and Information Security
By:Easttom, Chuck;
Pub Date:October 12th 2015
Format:Paperback 416 pages
eBook Available: View eBook Details
ISBN:1259588084 / 9781259588082
Your Price:$60.00 ADD TO CART
More Information




Main description

A Practical Guide to Cryptography Principles and Security Practices

Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today's data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors.

  • Learn the necessary number theory, discrete math, and algebra
  • Employ symmetric ciphers, including Feistel and substitution-permutation ciphers
  • Understand asymmetric cryptography algorithms
  • Design s-boxes that maximize output non-linearity
  • Deploy cryptographic hashes
  • Create cryptographic keys using pseudo random number generators
  • Encrypt Web traffic using SSL/TLS
  • Secure VPN, WiFi, and SSH communications
  • Work with cryptanalysis and steganography
  • Explore government, military, and intelligence agency applications


Table of contents

Section I: Foundations
Chapter 1: History of Cryptography to the 1800's
Chapter 2: History of Cryptography from the 1800's
Chapter 3: Basic Information Theory
Chapter 4: Essential Number Theory and Discrete Math
Chapter 5: Essential Algebra

Section II: Symmetric Ciphers and Hashes
Chapter 6: Feistel Networks
Chapter 7: Substitution-Permutation Networks
Chapter 8: S-Box Design
Chapter 9: Cryptographic Hashes

Section III: Asymmetric Ciphers
Chapter 10: Common Algorithms
Chapter 11: ECC

Section IV: Applications
Chapter 12: Random Number Generators
Chapter 13: SSL/TLS
Chapter 14: VPNs
Chapter 15: Military Applications
Chapter 16: Steganography
Chapter 17: Cryptanalysis
Chapter 18: Cryptographic Backdoors
Chapter 19: The Future of Cryptography

Section V: Appendices
Appendix A: Implementing Cryptography


Backcover

Author Information

Downloads & Resources

Downloads



Related Products

Owl Image

Date: Nov 22nd, 2016
Your Price: $50.00
Owl Image

Date: Nov 6th, 2016
Your Price: $140.00
Owl Image

Date: Nov 5th, 2016
Your Price: $60.00
Owl Image

Date: Oct 22nd, 2016
Your Price: $110.00
Owl Image

Date: Aug 26th, 2016
Your Price: $35.00
Owl Image

Date: May 22nd, 2016
Your Price: $80.00
Owl Image

Date: Apr 25th, 2016
Your Price: $85.00
Owl Image

Date: Mar 4th, 2016
Your Price: $60.00
Owl Image

Date: Dec 29th, 2015
Your Price: $99.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $95.00
Owl Image

Date: Dec 3rd, 2015
Your Price: $70.00
Owl Image

Date: Oct 12th, 2015
Your Price: $60.00
Owl Image

Date: Sep 17th, 2015
Your Price: $50.00
Owl Image

Date: Sep 5th, 2015
Your Price: $65.00
Owl Image

Date: Aug 13th, 2015
Your Price: $65.00