tailieunhanh - Ebook Modern Cryptography - Theory and Practice: Phần 1

Part 1 books Pc Underground give readers the knowledge overview: beginning with a simple communication game, wrestling between safeguard and attack, probability and information theory, computational complexity, algebraic foundations,. Invite you to consult. | Table of Contents Modern Cryptography Theory and Practice ByWenbo Mao Hewlett-Packard Company Publisher Prentice Hall PTR Pub Date July 25 2003 ISBN 0-13-066943-1 Pages 648 Many cryptographic schemes and protocols especially those based on public-keycryptography have basic or so-called textbook crypto versions as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography it pays much more attention tofit-for-application aspects of cryptography. It explains why textbook crypto isonly good in an ideal world where data are random and bad guys behave reveals the general unfitness of textbook crypto for the real world by demonstratingnumerous attacks on such schemes protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes protocols and systems many of them standards or de factoones studies them closely explains their working principles discusses their practicalusages and examines their strong . fit-for-application security properties oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography. Table of Contents Modern Cryptography Theory and Practice ByWenbo Mao Hewlett-Packard Company Publisher Prentice Hall PTR Pub Date July 25 2003 ISBN 0-13-066943-1 Pages 648 Copyright Hewlett-Packard Professional Books A Short Description of the Book Preface Scope Acknowledgements List of Figures List of Algorithms Protocols and Attacks Part I Introduction Chapter 1. Beginning with a Simple Communication Game Section . A Communication Game Section . Criteria for Desirable Cryptographic Systems and Protocols Section . Chapter Summary Exercises Chapter 2. Wrestling Between Safeguard and Attack Section . Introduction Section . Encryption Section . Vulnerable Environment the Dolev-Yao Threat

TỪ KHÓA LIÊN QUAN