tailieunhanh - Mật mã lý thuyết và thực hành

My objective in writing this book was to produce a general, comprehensive textbook that treats all the essential core areas of cryptography. Although many books and monographs on cryptography have been written in recent years, the majority of them tend to address specialized areas of cryptography. On the other hand, many of the existing general textbooks have become out-of-date due to the rapid expansion of research in cryptography in the past 15 years. | Cryptography Theory and Practice Table of Contents Cryptography Theory and Practice by Douglas Stinson CRC Press CRC Press LLC ISBN 0849385210 Pub Date 03 17 95 Preface Dedication Chapter 1 Classical Cryptography Introduction Some Simple Cryptosystems The Shift Cipher The Substitution Cipher The Affine Cipher The Vigenere Cipher The Hill Cipher The Permutation Cipher Stream Ciphers Cryptanalysis Cryptanalysis of the Affine Cipher Cryptanalysis of the Substitution Cipher Cryptanalysis of the Vigenere Cipher Cryptanalysis of the LFSR-based Stream Cipher Notes Exercises Chapter 2 Shannon s Theory Perfect Secrecy Entropy Huffman Encodings and Entropy Properties of Entropy Spurious Keys and Unicity Distance Product Cryptosystems Notes Exercises Chapter 3 The Data Encryption Standard Introduction Description of DES file D My 20Files eBooks _Government 20Publications Cryptography 20Theory 20and 20Practice 1 of 5 12 6 2003 9 16 55 AM Cryptography Theory and Practice Table of Contents An Example of DES Encryption The DES Controversy DES in Practice DES Modes of Operation A Time-memory Trade-off Differential Cryptanalysis An Attack on a 3-round DES An Attack on a 6-round DES Other examples of Differential Cryptanalysis Notes and References Exercises Chapter 4 The RSA System and Factoring Introduction to Public-key Cryptography More Number Theory The Euclidean Algorithm The Chinese Remainder Theorem Other Useful Facts The RSA Cryptosystem Implementing RSA Probabilistic Primality Testing Attacks On RSA The Decryption Exponent Partial Information Concerning Plaintext Bits The Rabin Cryptosystem Factoring Algorithms The p - 1 Method Dixon s Algorithm and the Quadratic Sieve Factoring Algorithms in Practice Notes and .