Gain the skills and knowledge needed to create effective data security
systems This book updates readers with all the tools, techniques, and
concepts needed to understand and implement data security systems. It
presents a wide range of topics for a thorough understanding of the
factors that affect the efficiency of secrecy, authentication, and
digital signature schema. Most importantly, readers gain hands-on
experience in cryptanalysis and learn how to create effective
cryptographic systems. The author contributed to the design and analysis
of the Data Encryption Standard (DES), a widely used symmetric-key
encryption algorithm. His recommendations are based on firsthand
experience of what does and does not work. Thorough in its coverage, the
book starts with a discussion of the history of cryptography, including
a description of the basic encryption systems and many of the cipher
systems used in the twentieth century. The author then discusses the
theory of symmetric- and public-key cryptography. Readers not only
discover what cryptography can do to protect sensitive data, but also
learn the practical limitations of the technology. The book ends with
two chapters that explore a wide range of cryptography applications.
Three basic types of chapters are featured to facilitate learning:
- Chapters that develop technical skills
- Chapters that describe a cryptosystem and present a method of
analysis
- Chapters that describe a cryptosystem, present a method of analysis,
and provide problems to test your grasp of the material and your ability
to implement practical solutions With consumers becoming increasingly
wary of identity theft and companies struggling to develop safe, secure
systems, this book is essential reading for professionals in e-commerce
and information technology. Written by a professor who teaches
cryptography, it is also ideal for students.
Download
systems This book updates readers with all the tools, techniques, and
concepts needed to understand and implement data security systems. It
presents a wide range of topics for a thorough understanding of the
factors that affect the efficiency of secrecy, authentication, and
digital signature schema. Most importantly, readers gain hands-on
experience in cryptanalysis and learn how to create effective
cryptographic systems. The author contributed to the design and analysis
of the Data Encryption Standard (DES), a widely used symmetric-key
encryption algorithm. His recommendations are based on firsthand
experience of what does and does not work. Thorough in its coverage, the
book starts with a discussion of the history of cryptography, including
a description of the basic encryption systems and many of the cipher
systems used in the twentieth century. The author then discusses the
theory of symmetric- and public-key cryptography. Readers not only
discover what cryptography can do to protect sensitive data, but also
learn the practical limitations of the technology. The book ends with
two chapters that explore a wide range of cryptography applications.
Three basic types of chapters are featured to facilitate learning:
- Chapters that develop technical skills
- Chapters that describe a cryptosystem and present a method of
analysis
- Chapters that describe a cryptosystem, present a method of analysis,
and provide problems to test your grasp of the material and your ability
to implement practical solutions With consumers becoming increasingly
wary of identity theft and companies struggling to develop safe, secure
systems, this book is essential reading for professionals in e-commerce
and information technology. Written by a professor who teaches
cryptography, it is also ideal for students.
Download
No comments:
Post a Comment