Cryptography : an introduction to computer security

by Jennifer Seberry

Other authorsJosef Pieprzyk (Author)
Paper Book, 1989

Status

Available

Call number

005.8

Library's review

Indeholder "Preface", "Chapter 1. Introduction", "Chapter 2. Background theory", "2.1 Mathematical methods", "2.2 Complexity theory", "2.3 Complexity of selected problems used in cryptology", "2.4 Information theory", "Chapter 3. Encryption methods of information protection", "3.1 Classical
Show More
ciphers", "3.2 Symmetric algorithms and DES", "3.3 Asymmetric algorithms or public key cryptosystems", "Chapter 4. Authentication methods", "4.1 Elementary methods of message authentication", "4.2 Subliminal channel", "4.3 Digital signatures", "4.4 Other authentication techniques", "4.5 Summary", "Chapter 5. Cryptography in computer network security", "5.1 Information protection in computer networks", "5.2 Key management issues", "5.3 Electronic funds transfer (EFT)", "5.4 Summary", "Chapter 6. Application of cryptography in databases", "6.1 Database model", "6.2 Crytographic transformation preserving data structure", "6.3 Application of cryptography to protection of information during processing", "6.4 Privacy homomorphisms", "6.5 Summary", "Chapter 7. Other cryptographic techniques", "7.1 Linear feedback shift registers", "7.2 One-way ciphers and passwords", "7.3 Smart cards and information cards", "7.4 Unforgeable ID cards using smart cards", "7.5 Summary", "Chapter 8. Security in operating systems", "8.1 Access control in computer systems", "8.2 Implementations of access control systems", "8.3 Rationale for security evaluation classes", "8.4 Summary", "Chapter 9. Minimum knowledge systems", "9.1 An introduction to the minimum knowledge concept", "9.2 More on the Fiat-Shamir smart card protocol", "9.3 Subliminal free verification using minimum knowledge protocols", "9.4 Conclusion", "Appendix A", "A.1 Frequencies of occurrences of characters in languages", "A.2 Frequencies of occurrences of pairs of letters in languages", "Appendix B", "B.1 DES code", "B.2 Key representation for DES", "Appendix C. ", "C.1 Vigenere, Beauford or Variant Beauford code", "Bibliography", "Index".

Udmærket gennemgang af kryptering og brug til fx autentificering, identifikation og signering. Der er drysset virkende c-programmer ud rundt omkring i bogen, så man kan se teorien og virkeligheden side om side.
Show Less

Publication

New York : Prentice-Hall, c1989.

Language

Original language

Danish

Physical description

viii, 375 p.; 24.1 cm

ISBN

0131949861 / 9780131949867

Local notes

Omslag: Ikke angivet
Omslaget viser bare forfatter og titel som tekst
Indskannet omslag - N650U - 150 dpi

Pages

viii; 375

Library's rating

Rating

(1 rating; 3)

DDC/MDS

005.8
Page: 0.2788 seconds