Welcome to Francis Light Library | francislightlibrary@peninsulamalaysia.edu.my | +604-545 600 EXt:8004
Image from Google Jackets

Everyday cryptography : fundamental principles and applications / Keith M. Martin.

By: Publisher: Oxford : Oxford University Press, 2017Copyright date: ©2017Edition: Second editionDescription: xxx, 674 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0198788002
  • 9780198788003
  • 9780198788010
  • 0198788010
Subject(s): DDC classification:
  • 652.8 23
LOC classification:
  • Z103 .M33 2017
Contents:
Setting the scene. Basic principles -- Historical cryptosystems -- Theoretical versus practical security -- The cryptographic toolkit. Symmetric encryption -- Public-key encryption -- Data integrity Digital signature schemes -- Entity authentication -- Cryptographic protocols -- Key management. Public-key management -- Use of cryptography. Cryptographic applications -- Cryptography for personal devices -- Control of cryptography -- Mathematics appendix. Decimal, binary, and hex -- Modular arithmetic -- The mathematics of RSA -- The mathematics of ElGamal.
Summary: Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the internet, mobile phones, WiFi networks, payment cards, Tor, and Bitcoin.
List(s) this item appears in: Newest Publication
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Shelving location Call number Copy number Status Date due Barcode
ACADEMIC ACADEMIC FRANCIS LIGHT LIBRARY SHELVES 1 005.824 MAR (Browse shelf(Opens below)) 1 Checked out 04/07/2024 00000607

Includes bibliographical references (pages 655-666) and index.

Setting the scene. Basic principles -- Historical cryptosystems -- Theoretical versus practical security -- The cryptographic toolkit. Symmetric encryption -- Public-key encryption -- Data integrity Digital signature schemes -- Entity authentication -- Cryptographic protocols -- Key management. Public-key management -- Use of cryptography. Cryptographic applications -- Cryptography for personal devices -- Control of cryptography -- Mathematics appendix. Decimal, binary, and hex -- Modular arithmetic -- The mathematics of RSA -- The mathematics of ElGamal.

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the internet, mobile phones, WiFi networks, payment cards, Tor, and Bitcoin.

There are no comments on this title.

to post a comment.

The Ship Campus, No.1 Education Boulevard,One Auto Hub, Batu Kawan Industrial Park,14110, Bandar Cassia, Penang,Malaysia.Phone: +604 585 5000 Fax: +604 585 5009 | Email: noorshahidah@penisulacollege.edu.my 

Powered by KOHA |© Maintained by WISERF