000 06404cam a2200781Ma 4500
001 ocn828735989
003 OCoLC
005 20230823095500.0
006 m o d
007 cr cn||||||||a
008 120820s2013 njuad ob 001 0 eng d
040 _aE7B
_beng
_epn
_cE7B
_dOCLCO
_dOCLCQ
_dYDXCP
_dDG1
_dUKMGB
_dIEEEE
_dNOC
_dOCLCO
_dOCLCF
_dN$T
_dCDX
_dCOO
_dIDEBK
_dEBLCP
_dUKDOC
_dDEBSZ
_dOCLCQ
_dLOA
_dOCLCQ
016 7 _a016182125
_2Uk
019 _a824697371
_a827623334
_a960200499
_a961570920
_a962709374
020 _a9781118482315
_q(electronic bk.)
020 _a111848231X
_q(electronic bk.)
020 _a9781118482261
_q(electronic bk.)
020 _a1118482263
_q(electronic bk.)
020 _a9781283960526
_q(MyiLibrary)
020 _a1283960524
_q(MyiLibrary)
020 _z9781118317129
_q(cloth)
020 _z1118317122
024 3 _a9781118482261
029 1 _aAU@
_b000050824139
029 1 _aCHBIS
_b010026750
029 1 _aCHVBK
_b306234947
029 1 _aDEBBG
_bBV041906334
029 1 _aDEBBG
_bBV043395533
029 1 _aDEBSZ
_b400042762
029 1 _aDEBSZ
_b431299145
029 1 _aDEBSZ
_b449341380
029 1 _aNLGGC
_b35670405X
029 1 _aNZ1
_b15340409
035 _a(OCoLC)828735989
_z(OCoLC)824697371
_z(OCoLC)827623334
_z(OCoLC)960200499
_z(OCoLC)961570920
_z(OCoLC)962709374
050 4 _aTK5102.94
_b.B38 2013eb
072 7 _aCOM
_x083000
_2bisacsh
082 0 4 _a005.8/2
_223
049 _aMAIN
100 1 _aBatten, Lynn Margaret.
245 1 0 _aPublic key cryptography :
_bapplications and attacks /
_cLynn Margaret Batten.
260 _aHoboken, N.J. :
_bJohn Wiley & Sons,
_c©2013.
300 _a1 online resource (xvii, 201 pages) :
_billustrations.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aIEEE Press series on information and communication networks security
504 _aIncludes bibliographical references and index.
505 0 _aPUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic.
505 8 _a2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples.
505 8 _a4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem.
505 8 _a5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples.
505 8 _a6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test.
520 _aThis book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur.
650 0 _aPublic key cryptography.
650 0 _aCryptography
_xMathematics.
650 4 _aCryptography
_xHistory.
650 4 _aCryptography
_xMathematics.
650 4 _aPublic key cryptography.
650 7 _aCOMPUTERS
_xSecurity
_xCryptography.
_2bisacsh
650 7 _aCryptography
_xMathematics.
_2fast
_0(OCoLC)fst00884558
650 7 _aPublic key cryptography.
_2fast
_0(OCoLC)fst01082562
655 4 _aElectronic books.
776 0 8 _iPrint version:
_aBatten, Lynn Margaret.
_tPublic key cryptography.
_dHoboken, N.J. : John Wiley & Sons, ©2013
_w(DLC) 2012025411
830 0 _aIEEE Press series on information & communication networks security.
856 4 0 _uhttp://dx.doi.org/10.1002/9781118482261
_zWiley Online Library
994 _a92
_bDG1
999 _c20234
_d20193
526 _bmc