9781259588082

Modern Cryptography: Applied Mathematics for Encryption and Information Security

by
  • ISBN13:

    9781259588082

  • ISBN10:

    1259588084

  • Edition: 1st
  • Format: Paperback
  • Copyright: 10/12/2015
  • Publisher: McGraw-Hill Education

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping On Orders Over $59!
    Your order must be $59 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $60.00 Save up to $15.20
  • Rent Book $45.00
    Add to Cart Free Shipping

    TERM
    PRICE
    DUE

Supplemental Materials

What is included with this book?

  • The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
  • The Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Summary

This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required

Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.

The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.

  • Concisely explains complex formulas and equations and makes the math easy
  • Teaches even the information security novice critical encryption skills
  • Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world

Table of Contents

Section I: Foundations
Chapter 1: History of Cryptography to the 1800's
Chapter 2: History of Cryptography from the 1800's
Chapter 3: Basic Information Theory
Chapter 4: Essential Number Theory and Discrete Math
Chapter 5: Essential Algebra

Section II: Symmetric Ciphers and Hashes
Chapter 6: Feistel Networks
Chapter 7: Substitution-Permutation Networks
Chapter 8: S-Box Design
Chapter 9: Cryptographic Hashes

Section III: Asymmetric Ciphers
Chapter 10: Common Algorithms
Chapter 11: ECC

Section IV: Applications
Chapter 12: Random Number Generators
Chapter 13: SSL/TLS
Chapter 14: VPNs
Chapter 15: Military Applications
Chapter 16: Steganography
Chapter 17: Cryptanalysis
Chapter 18: Cryptographic Backdoors

Rewards Program

Write a Review