Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Title Page Copyright Page Contents Preface Prologue 1 The Foundations of Encryption
What Is a Cipher? Shannon’s Encryption Model The Relationship Between the Encryption Key and the Decryption Key Classic Encryption Methods Cipher Security The Substitution Cipher’s Key Space Permutation, Combination, and Frequency Analysis The Polyalphabetic Cipher’s Key Space The Transposition Cipher’s Key Space When Breaking Classical Encryption is Possible
2 Symmetric-Key Algorithms
Binary Digits and Logical Operators Symmetric-Key Algorithms Stream Ciphers Block Ciphers CBC Mode DES Ciphers 3-DES Encryption and AES Encryption Simplified DES Encryption and Decryption Converting Data into Binary Generating a DES Ciphertext Decrypting a DES Ciphertext Generating DES Keys How Reduced DES Differs from Real DES
3 Public-Key Encryption
The Basics of Public-Key Encryption Prime Numbers and Integer Factorization Modulo Operations Fermat’s Little Theorem and Euler’s Theorem The Structure of RSA Encryption Public-Key Encryption and Discrete Logarithm Problems
4 Practical Applications of Encryption
Hybrid Encryption Hash Functions and Message Authentication Codes Digital Signatures Public-Key Infrastructure Zero-Knowledge Interactive Proof
What Next?
Pseudorandom Numbers and Encryption Security PGP SSL/TLS Quantum Cryptography Biometrics
Index Back Cover
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion