000 | 06404cam a2200781Ma 4500 | ||
---|---|---|---|
001 | ocn828735989 | ||
003 | OCoLC | ||
005 | 20230823095500.0 | ||
006 | m o d | ||
007 | cr cn||||||||a | ||
008 | 120820s2013 njuad ob 001 0 eng d | ||
040 |
_aE7B _beng _epn _cE7B _dOCLCO _dOCLCQ _dYDXCP _dDG1 _dUKMGB _dIEEEE _dNOC _dOCLCO _dOCLCF _dN$T _dCDX _dCOO _dIDEBK _dEBLCP _dUKDOC _dDEBSZ _dOCLCQ _dLOA _dOCLCQ |
||
016 | 7 |
_a016182125 _2Uk |
|
019 |
_a824697371 _a827623334 _a960200499 _a961570920 _a962709374 |
||
020 |
_a9781118482315 _q(electronic bk.) |
||
020 |
_a111848231X _q(electronic bk.) |
||
020 |
_a9781118482261 _q(electronic bk.) |
||
020 |
_a1118482263 _q(electronic bk.) |
||
020 |
_a9781283960526 _q(MyiLibrary) |
||
020 |
_a1283960524 _q(MyiLibrary) |
||
020 |
_z9781118317129 _q(cloth) |
||
020 | _z1118317122 | ||
024 | 3 | _a9781118482261 | |
029 | 1 |
_aAU@ _b000050824139 |
|
029 | 1 |
_aCHBIS _b010026750 |
|
029 | 1 |
_aCHVBK _b306234947 |
|
029 | 1 |
_aDEBBG _bBV041906334 |
|
029 | 1 |
_aDEBBG _bBV043395533 |
|
029 | 1 |
_aDEBSZ _b400042762 |
|
029 | 1 |
_aDEBSZ _b431299145 |
|
029 | 1 |
_aDEBSZ _b449341380 |
|
029 | 1 |
_aNLGGC _b35670405X |
|
029 | 1 |
_aNZ1 _b15340409 |
|
035 |
_a(OCoLC)828735989 _z(OCoLC)824697371 _z(OCoLC)827623334 _z(OCoLC)960200499 _z(OCoLC)961570920 _z(OCoLC)962709374 |
||
050 | 4 |
_aTK5102.94 _b.B38 2013eb |
|
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
082 | 0 | 4 |
_a005.8/2 _223 |
049 | _aMAIN | ||
100 | 1 | _aBatten, Lynn Margaret. | |
245 | 1 | 0 |
_aPublic key cryptography : _bapplications and attacks / _cLynn Margaret Batten. |
260 |
_aHoboken, N.J. : _bJohn Wiley & Sons, _c©2013. |
||
300 |
_a1 online resource (xvii, 201 pages) : _billustrations. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
490 | 1 | _aIEEE Press series on information and communication networks security | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aPUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic. | |
505 | 8 | _a2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples. | |
505 | 8 | _a4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem. | |
505 | 8 | _a5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples. | |
505 | 8 | _a6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test. | |
520 | _aThis book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur. | ||
650 | 0 | _aPublic key cryptography. | |
650 | 0 |
_aCryptography _xMathematics. |
|
650 | 4 |
_aCryptography _xHistory. |
|
650 | 4 |
_aCryptography _xMathematics. |
|
650 | 4 | _aPublic key cryptography. | |
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography. _2bisacsh |
|
650 | 7 |
_aCryptography _xMathematics. _2fast _0(OCoLC)fst00884558 |
|
650 | 7 |
_aPublic key cryptography. _2fast _0(OCoLC)fst01082562 |
|
655 | 4 | _aElectronic books. | |
776 | 0 | 8 |
_iPrint version: _aBatten, Lynn Margaret. _tPublic key cryptography. _dHoboken, N.J. : John Wiley & Sons, ©2013 _w(DLC) 2012025411 |
830 | 0 | _aIEEE Press series on information & communication networks security. | |
856 | 4 | 0 |
_uhttp://dx.doi.org/10.1002/9781118482261 _zWiley Online Library |
994 |
_a92 _bDG1 |
||
999 |
_c20234 _d20193 |
||
526 | _bmc |