Catalog

Record Details

Catalog Search



The mathematics of encryption : an elementary introduction / Margaret Cozzens, Steven J. Miller.

Cozzens, Margaret. (Author). Miller, Steven J., 1974- (Added Author).

Record details

  • ISBN: 9780821883211
  • Physical Description: xvii, 332 páginas : ilustraciones a color ; 26 cm.
  • Publisher: Providence, Rhode Island : American Mathematical Society, [2013] .

Content descriptions

Bibliography, etc. Note:
Incluye bibliografía e índice.
Immediate Source of Acquisition Note:
Compra/R.1615-2014.
Language Note:
En inglés
Subject: Teoría de la codificación > Libros de texto.
Criptografía > Libros de texto.
Criptografía > Matemáticas > Libros de texto.
Criptografía > Historia > Libros de texto.

Available copies

  • 1 of 1 copy available at IPICYT.

Holds

  • 0 current holds with 1 total copy.
Show All Copies
Location Call Number / Copy Notes Barcode Shelving Location Status Due Date
Biblioteca Ipicyt QA268C6 M3 2013 v. 29 APL01344 Coleccion General Available -

Prefacexi
Acknowledgmentsxvii
Chapter 1. Historical Introduction1
1.1. Ancient Times2
1.2. Cryptography During the Two World Wars8
1.3. Postwar Cryptography, Computers, and Security12
1.4. Summary14
1.5. Problems15
Chapter 2. Classical Cryptology: Methods19
2.1. Ancient Cryptography20
2.2. Substitution Alphabet Ciphers22
2.3. The Caesar Cipher24
2.4. Modular Arithmetic26
2.5. Number Theory Notation28
2.6. The Affine Cipher30
2.7. The Vigenère Cipher33
2.8. The Permutation Cipher36
2.9. The Hill Cipher39
2.10. Summary42
2.11. Problems42
Chapter 3. Enigma and Ultra51
3.1. Setting the Stage51
3.2. Some Counting54
3.3. Enigma's Security60
3.4. Cracking the Enigma67
3.5. Codes in World War II70
3.6. Summary72
3.7. Appendix: Proofs by Induction73
3.8. Problems75
Chapter 4. Classical Cryptography: Attacks I81
4.1. Breaking the Caesar Cipher81
4.2. Function Preliminaries84
4.3. Modular Arithmetic and the Affine Cipher86
4.4. Breaking the Affine Cipher91
4.5. The Substitution Alphabet Cipher94
4.6. Frequency Analysis and the Vigenère Cipher99
4.7. The Kasiski Test102
4.8. Summary106
4.9. Problems107
Chapter 5. Classical Cryptography: Attacks II113
5.1. Breaking the Permutation Cipher114
5.2. Breaking the Hill Cipher115
5.3. Running Key Ciphers120
5.4. One-Time Pads122
5.5. Summary127
5.6. Problems128
Chapter 6. Modern Symmetric Encryption133
6.1. Binary Numbers and Message Streams133
6.2. Linear Feedback Shift Registers138
6.3. Known-Plaintext Attack on LFSR Stream Ciphers142
6.4. LFSRsum145
6.5. BabyCSS150
6.6. Breaking BabyCSS152
6.7. BabyBlock158
6.8. Security of BabyBlock161
6.9. Meet-in-the-Middle Attacks162
6.10. Summary164
6.11. Problems164
Chapter 7. Introduction to Public-Channel Cryptography171
7.1. The Perfect Code Cryptography System173
7.2. KidRSA180
7.3. The Euclidean Algorithm182
7.4. Binary Expansion and Fast Modular Exponentiation188
7.5. Prime Numbers192
7.6. Fermat's Little Theorem198
7.7. Summary203
7.8. Problems203
Chapter 8. Public-Channel Cryptography213
8.1. RSA214
8.2. RSA and Symmetric Encryption218
8.3. Digital Signatures219
8.4. Hash Functions221
8.5. Diffie-Hellman Key Exchange225
8.6. Why RSA Works228
8.7. Summary230
8.8. Problems231
Chapter 9. Error Detecting and Correcting Codes239
9.1. Introduction240
9.2. Error Detection and Correction Riddles241
9.3. Definitions and Setup247
9.4. Examples of Error Detecting Codes249
9.5. Error Correcting Codes252
9.6. More on the Hamming (7,4) Code255
9.7. From Parity to UPC Symbols257
9.8. Summary and Further Topics259
9.9. Problems261
Chapter 10. Modern Cryptography269
10.1. Steganography — Messages You Don't Know Exist269
10.2. Steganography in the Computer Age273
10.3. Quantum Cryptography278
10.4. Cryptography and Terrorists at Home and Abroad282
10.5. Summary285
10.6. Problems285
Chapter 11. Primality Testing and Factorization289
11.1. Introduction289
11.2. Brute Force Factoring291
11.3. Fermat's Factoring Method295
11.4. Monte Carlo Algorithms and the Fermat Primality Test299
11.5. Miller-Rabin Test302
11.6. Agrawal-Kayal-Saxena Primality Test305
11.7. Problems310
Chapter 12. Solutions to Selected Problems317
12.1. Chapter 1: Historical Introduction317
12.2. Chapter 2: Classical Cryptography: Methods317
12.3. Chapter 3: Enigma and Ultra318
12.4. Chapter 4: Classical Cryptography: Attacks I319
12.5. Chapter 5: Classical Cryptography: Attacks II320
12.6. Chapter 6: Modern Symmetric Encryption320
12.7. Chapter 7: Introduction to Public-Channel Cryptography320
12.8. Chapter 8: Public-Channel Cryptography321
12.9. Chapter 9: Error Detecting and Correcting Codes321
12.10. Chapter 10: Modern Cryptography322
12.11. Chapter 11: Primality Testing and Factorization322
Bibliography325
Index329

Additional Resources