Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright Page
Contents
Preface
Prologue
1 The Foundations of Encryption
What Is a Cipher?
Shannon’s Encryption Model
The Relationship Between the Encryption Key and the Decryption Key
Classic Encryption Methods
Cipher Security
The Substitution Cipher’s Key Space
Permutation, Combination, and Frequency Analysis
The Polyalphabetic Cipher’s Key Space
The Transposition Cipher’s Key Space
When Breaking Classical Encryption is Possible
2 Symmetric-Key Algorithms
Binary Digits and Logical Operators
Symmetric-Key Algorithms
Stream Ciphers
Block Ciphers
CBC Mode
DES Ciphers
3-DES Encryption and AES Encryption
Simplified DES Encryption and Decryption
Converting Data into Binary
Generating a DES Ciphertext
Decrypting a DES Ciphertext
Generating DES Keys
How Reduced DES Differs from Real DES
3 Public-Key Encryption
The Basics of Public-Key Encryption
Prime Numbers and Integer Factorization
Modulo Operations
Fermat’s Little Theorem and Euler’s Theorem
The Structure of RSA Encryption
Public-Key Encryption and Discrete Logarithm Problems
4 Practical Applications of Encryption
Hybrid Encryption
Hash Functions and Message Authentication Codes
Digital Signatures
Public-Key Infrastructure
Zero-Knowledge Interactive Proof
What Next?
Pseudorandom Numbers and Encryption Security
PGP
SSL/TLS
Quantum Cryptography
Biometrics
Index
Back Cover
← Prev
Back
Next →
← Prev
Back
Next →