Cryptology: Classical and Modern with Maplets

Cryptology: Classical and Modern with Maplets

English | 2012 | ISBN: 1439872414 | PDF | 549 Pages | 9.0 mb

Easily Accessible to Students with Nontechnical Backgrounds
In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, the book assumes minimal mathematical prerequisites and incorporates student-friendly Maplets throughout that provide practical examples of the techniques used.

Technology Resource
By using the Maplets, students can complete complicated tasks with relative ease. They can encrypt, decrypt, and cryptanalyze messages without the burden of understanding programming or computer syntax. The authors explain topics in detail first before introducing one or more Maplets. All Maplet material and exercises are given in separate, clearly labeled sections. Instructors can omit the Maplet sections without any loss of continuity and non-Maplet examples and exercises can be completed with, at most, a simple hand-held calculator. The Maplets are available for download at

A Gentle, Hands-On Introduction to Cryptology
After introducing elementary methods and techniques, the text fully develops the Enigma cipher machine and Navajo code used during World War II, both of which are rarely found in cryptology textbooks. The authors then demonstrate mathematics in cryptology through monoalphabetic, polyalphabetic, and block ciphers. With a focus on public-key cryptography, the book describes RSA ciphers, the Diffie-Hellman key exchange, and ElGamal ciphers. It also explores current U.S. federal cryptographic standards, such as the AES, and explains how to authenticate messages via digital signatures, hash functions, and certificates.


[Fast Download] Cryptology: Classical and Modern with Maplets

Related eBooks:
Vulnerability Analysis IOS App Ethical Hacking Course
IOS Ethical Hacking Course
Android Ethical Hacking Course
You Can't Tell the People
Ordinary Men
Reverse Engineering Code with IDA Pro
The Palgrave Handbook of Global Approaches to Peace
Building a Comprehensive IT Security Program: Practical Guidelines and Best Practices
U.S. Army Guide to Military Mountaineering (US Army Survival)
Brute Force: Cracking the Data Encryption Standard
Pathology of Learning in Cyber Space: Concepts, Structures and Processes
Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.