computer security & cryptography

542 328 0
computer security & cryptography

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

www.sharexxx.net - free books & magazines COMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM COMPUTER SECURITY AND CRYPTOGRAPHY [...]... nature of secrecy and the “practical” limitations of cryptography in providing secrecy and its derivatives (authentication and digital signatures) MY PRIOR ART Parts of Computer Security and Cryptography have served as the text for CMPSC 178 (Introduction to Cryptography) at UCSB It is an upper-division elective in the undergraduate program of the Computer Science Department of the University of California... Knapsack Cryptosystem The RSA Cryptosystem Primality and Factorization The Discrete Logarithm Problem Elliptic Curve Cryptography Key Exchange in a Network Digital Signatures & Authentication Applications (ATM, Access Control, the Web) Patents in Cryptography xiv PREFACE Computer Security and Cryptography is an expanded version of the CMPSC 178 Reader, modified to make it appropriate for a wider audience... internal program store central to the concept of a computer 1.8 THE NATIONAL SECURITY AGENCY The development of the computer in the United States was fostered in part by the National Security Agency (Fig 1.7) [Bramford, 1982], which merged several separate cryptologic organizations when it came into being on November 4, 1952 The National Security Agency/Central Security Service (CSS) is responsible for the... Long Island, NewYork October 2006 DAVID KAHN ix PREFACE NATIONAL SECURITY AND COMPUTER SECURITY On September 11, 2001, the word security moved into the foreground of our national consciousness, where it continues to reside today The presidential election in 2004 was largely decided on the basis of which candidate was perceived to best manage security for the American people Americans are puzzled about... of ciphertext requires the students to copy the ciphertext files from my Web page The same procedure will be followed with Computer Security and Cryptography; the ciphertext for the exercises may be downloaded from Wiley’s ftpsite at ftp://ftp.wiley.com/public/sci_tech_med /computer_ security PREFACE xiii A replica of the cover page of my CMPSC 178 Reader appears above One of my colleagues claimed that... The missions of the National Security Agency/Central Security Service (CSS) include both the protection of U.S communications and the production of foreign intelligence Although cryptography plays a role in both of these areas, this book is not about either This book is about the role of cryptography in our day-to-day lives Today, there is no activity that does not depend on computers When there is a... Evaluation, Computer Networks and Cryptography I developed CMPSC 178 (Introduction to Cryptography) and offered this course 21 times at UCSB and three times at the Technion (Haifa, Israel), LaTrobe University (Melbourne, Australia) and at the University of Hawaii (Honolulu) I retired from UCSB on July 1, 2005 to pursue a life of indolence Cryptography: A Primer was published by John Wiley & Sons Inc.,... so Cryptography has a role to play in many areas Like seat belts, it will not completely protect us In the chapters that follow, I will develop the basic ideas about cryptography and then illustrate some of the ways it interacts with and protects us WHY STUDY CRYPTOGRAPHY? There is a symbiotic relationship between cryptography and the development of highperformance computing systems Modern-day computers... Hiss to be traitors 8 1.7 CHAPTER 1 APERITIFS CRYPTOGRAPHY AND COMPUTERS There has been a symbiotic relationship between cryptography and the development of high-performance computing systems As cryptographic systems increased in their sophistication, the need to develop more efficient methods to cryptanalyze them became the stimulus for the development of computers Chapter 6 describes two of the three... text be understandable nor that it be grammatically correct relative to a natural language; thus Good_Morning and vUIÃ _9Uiing8 are both examples of ASCII text Computer Security and Cryptography By Alan G Konheim Copyright # 2007 John Wiley & Sons, Inc 1 2 CHAPTER 1 APERITIFS Figure 1.1 The encipherment transformation Encipherment or encryption is a transformation process (Fig 1.1), T enciphering the . www.sharexxx.net - free books & magazines COMPUTER SECURITY AND CRYPTOGRAPHY ALAN G. KONHEIM COMPUTER SECURITY AND CRYPTOGRAPHY

Ngày đăng: 25/03/2014, 11:11

Tài liệu cùng người dùng

Tài liệu liên quan