在好例子网,分享、交流、成长!
您当前所在位置:首页Others 开发实例一般编程问题 → Introduction to Cryptography with Coding Theory(Wade Trappe)

Introduction to Cryptography with Coding Theory(Wade Trappe)

一般编程问题

下载此实例
  • 开发语言:Others
  • 实例大小:13.01M
  • 下载次数:6
  • 浏览次数:135
  • 发布时间:2020-08-08
  • 实例类别:一般编程问题
  • 发 布 人:robot666
  • 文件格式:.pdf
  • 所需积分:2
 

实例介绍

【实例简介】
Introduction to Cryptography with Coding Theory(Wade Trappe) 这本书是一本关于密码学的基础,从最古老的密码学到现在的一些基础知识。
Introduction to Crypto graphy with Coding Theory If you purchase this book within the United States or Canada you should be aware that it has becn wrongfully imported without the approval of the publisher or the Author xccutivc Acquisitions Editar: George Lobell Editor-in-Chief: Sally Yagan Production Editor Racgan Keida Senior Managing Editor: Linda Miharov Berens Assistant Managing Editor: Bayani Mendoza de lcon Exccutivc Managing Editor: Kathleen SchIaparelli Manufacturing Buycr: Alan Fiscicr Marketng Manager: Halee Dinsey Marketing Assistant: Joon lon Moon Cover designer Bruce Kensela Art Director: Jayne Confe DIrector of Creative Services: Psul Belt Manager, Cover VIsual Research Permissions: Karen Sanafar Editorial Assistant: jennifer Urban Cover Image: Pillowslip Squarc Dance by Collier CampbelI LifGivorks. o Collier Campbell Lifework/CORBIS PEARSON 92006,2002 Pearson Education. Ic Pearson Prcrlticc Hall Prealc Pearson Education, Inc Upper Saddle Ri ver, N 07458 Al righs rescrved. No part of this book may be reproduced, in any form or by uny mcans, without permission in writing from the publisher Pearson Prentice Hall is a trademark of Pearson Education,Inc "MATLAB"is a registered trademark and the L-shape of the membrane bogo is a trademark of The Matrworks, Inc. used by permission Maple is a registered trademark of Maplesoft, a division of Waterloo Maple, Inc. Mathematica"is a registered trademark of Wolfram Research inc. Printed in the United Statcs of America 10987654321 IssN0-13-198199-4 Pearson Education, Lid. London carson Education Auslrmlin PTY Limited, Sydney Pearson Education Singapore, PLr., Ltd Pearson Education Norh Asia Ltd Hong Kong Pearson Education Canada, Ltd. Toronto Pearson Enducation de mexico, S.A. dc Cv Pearson Educauion-Jopan, Tokyo Pearson Education Malaysia, Pte Ltd Pearson Education, Upper Saddie River, New Jersey Contents Prefa 1 Overview of Cryptography and Its Applications 1.1 Secure Communications 1.2 Cryptographic applications 12g 2 Classical Cryptosystems 12 2.1 Shiit Ciphers 13 2.2 Aine ciphe 14 2.3 The vigenere Cipher 16 2.4 Substitution Ciphe 24 2.5 Sherlock holmes ,27 2.6 The Playfair and ADFGX Ciphers 30 2.7 Block Ciph 2.8 Binary Numbers and ASCIi 2.9 One-Time Pads 38g 2.10 Pseudo-random bit generation 41 2.11 LFSR Sequences 43 2. 12 Enigma 2.13 Exercises 2. 14 Computer Problems 3 Basic ber Theory 63 3.1 Basic notions 63 3.2 Solving aT +by=d 3.3C 70 3.4 The Chinese remainder Theorem 76 3.5 Modular Exponentiation 78 3.6 Fermat and euler 3.7 Primitive Roots 38 Inverting Matrices Mod∴…· 85 3.9 Square Roots Mod n 86 3.10 Legendre and Jacobi Symbols 88 3.11 Finite fields .93 CoNTENTS 3.12 Continued fractions 3. 13 Exercises 104 3. 14 Computer Problems III 4 The Data Encryption Standard 113 4.1 Introduction 4.2 A Simplified dES-Type algorithm 114 4.3 Differential Cryptanalysis 118 4. DES ,..123 4.5 Modes of Operation 4.6 Breaking dEs 13g 4.7 Meet-in-the-Middle Attacks 4.8 Password Security 144 4.9 Exercises 146 4.10 Computer Problems 149 5 The Advanced Encryption Standard: Rijndael 151 5.1 The Basic algorithm 152 5.2 The lay 15 5.3 Decrypt 158 5. Design Considerations 5.5 Exercises 6 The RSA algor 164 6.1 The Rsa algorithrm .164 6.2 Attacks on RSA 6.3 Primality Testing 176 6. 4 Factoring 181 6. 5 The RSA Challenge 18″ 6.6 An Application to Treaty Verification 18 6.7 The Public Key Concept 18g 6.8 Exercises .,192 6.9 Computer Problems 197 7 Discrete Logarithms 201 7.1 Discrete Logarithms 201 7.2 Computing Discrete Logs 7.3 Bit Commitmen 209 7. 4 Diffie-Hellman Key Xchange 210 7.5 The ElGamal Public Key Cryptosystem ,、212 76E 214 7.7 Computer Problems ,216 CONTENTS 8 Hash Functions 218 8. 1 Hash Functions 218 8.2 A Simple Hash Example 222 8. 3 The Secure Hash algorithm 224 8. 4 Birthday Attacks 229 8. 5 Multicollisions 232 8.6 The Random Oracle model 8.7 Using Hash Functions to Encrypt 238 8.8 Exerci 8.9 Computer Problems 242 9 Digital Signatures 244 9. 1 RSA Signatures 245 9. 2 The ElGamal Signature Scheme 246 9. 3 Hashing and Signin 249 9.4 Birthday Attacks on Signatures 250 9.5 The Digital Signature algorithm 25 9.6 Exercises 252 9.7 Computer Problem 255 10 Security Protocols 256 10.1 Intruders- in-the-Middle and Impostors 257 10.2 Key Distribution 259 10.3 Kerberos 266 10.4 Public Key Infrastructures(PKi) .270 10.5 X509 Certificates 271 10.6 Pretty Good Privacy 277 10.7 SSL and TLS 108 Secure Electronic Transaction∵… .280 283 10.9 Exercises 285 11 Digital Cash 287 11.i Digital cash 287 11.2 Exercises 294 12 Secret Sharing Schemes 296 12.1 Secret Splitting ,296 12.2 Threshold schemes 297 12.3 Exercises 303 12.4 Computer Problems 305 v CONTENTS 13 Games 307 .3 1 Flipping Coins over the Telephone 307 13.2 Poker over the Telephone ,309 13.3 Exercises 14 Zero-Knowledge Techniques 316 14. 1 The Basic Setup 316 14.2 The Feige-Fiat-Shamir Identification Scheme 319 14.3 Exercises 15 Information Theor 325 15.1 Probability Review .,326 15.2 Entropy 328 15.3 Fuhrman Codes .333 15. Perfect se 335 15.5 The Entropy of English 338 15.6 Exercises 343 16 Elliptic Curves 347 16.1 Tle Addition Law 347 16.2 Elliptic Curves Mod p ,,,352 16. 3 Factoring with Elliptic Curves 356 16.4 Elliptic Curves in Characteristic 2 360 16.5 Elliptic Curve Cryptosystems 鲁 363 16.6 Identity-Based Encryption 366 167E 16.8 Compliter Problems 374 I了 Lattice Methods 376 17.1 Lattices 376 17.2 Lattice Reduction 377 17.3 An Attacl on RSA 382 17.4 NTRU 385 17.5 Exercises 390 18 Error Correcting Codes 392 18.1 Introduct 392 18.2 Error Correcting Codes 398 18.3 Bounds on General Codes 8.4 Li 408 18.5 Hamming Codes 416 18.6 Golay Codes 18.7 Cyclic Codes 426 18.8 BCH Codes 432 CONTENTS 18.9 Reed-Solomon Codes 440 18.10 The McEliece Cryptosystem 442 18 11 Other Topics 444 18.12 Exercises 445 18.13 Computer Problems 449 19 Quantum Techniques in Cryptography 450 19.1 A Quantum Experiment 451 19.2 Quantum Key Distribution 454 19.3 Shor s Algorithm 456 19.4 Exercises 466 A Mathematica Examples 467 A 1 Getting Started with Mathematica 467 A. 2 Some Commands 469 A 3 Exampl 470 A 4 Examples for Chapter 3 4T7 A. 5 Examples for Chapter 6 480 A 6 Examples for Chapter 8 487 A 7 Examples for Chapter 12 看· 487 A 8 Examples for Chapter 13 488 A 9 Examples for Chapter 16 490 B Maple Example 495 B. 1 Getting Started with Maple B. 2 Some Commands 496 B3 Examples for Chapter 2 498 B4 Examples for Clapter 3 505 B 5 Examples for Chapter 6 509 B6 Examples for Chapter 8 .517 B7 Examples for Chapter 12 518 B 8 Examples for Chapter 13 519 B9 Examples for Chapter 16 .521 C MATLAB Examples 527 C 1 Getting Started with MATLAB 528 C2 Examples for Chapter 2 ,,,,,533 C3 Examples for Cliapter 3 .544 C 4 Examples for Chapter 6 548 C5 Examples for Chapter 8 ,.553 C 6 Examples for Chapter 12 553 C 7 Examples for Chapter 13 554 C 8 Examples for Chapter 16 【实例截图】
【核心代码】

标签:

实例下载地址

Introduction to Cryptography with Coding Theory(Wade Trappe)

不能下载?内容有错? 点击这里报错 + 投诉 + 提问

好例子网口号:伸出你的我的手 — 分享

网友评论

发表评论

(您的评论需要经过审核才能显示)

查看所有0条评论>>

小贴士

感谢您为本站写下的评论,您的评论对其它用户来说具有重要的参考价值,所以请认真填写。

  • 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  • 相信您也不想看到一排文字/表情墙,所以请不要反馈意义不大的重复字符,也请尽量不要纯表情的回复。
  • 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  • 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。

关于好例子网

本站旨在为广大IT学习爱好者提供一个非营利性互相学习交流分享平台。本站所有资源都可以被免费获取学习研究。本站资源来自网友分享,对搜索内容的合法性不具有预见性、识别性、控制性,仅供学习研究,请务必在下载后24小时内给予删除,不得用于其他任何用途,否则后果自负。基于互联网的特殊性,平台无法对用户传输的作品、信息、内容的权属或合法性、安全性、合规性、真实性、科学性、完整权、有效性等进行实质审查;无论平台是否已进行审查,用户均应自行承担因其传输的作品、信息、内容而可能或已经产生的侵权或权属纠纷等法律责任。本站所有资源不代表本站的观点或立场,基于网友分享,根据中国法律《信息网络传播权保护条例》第二十二与二十三条之规定,若资源存在侵权或相关问题请联系本站客服人员,点此联系我们。关于更多版权及免责申明参见 版权及免责申明

;
报警