skip to content
Introduction to cryptography : with coding theory Preview this item
ClosePreview this item

Introduction to cryptography : with coding theory

Author: Wade Trappe; Lawrence C Washington
Publisher: Upper Saddle River, NJ Pearson Prentice Hall 2006
Edition/Format:   Print book : English : 2nd edView all editions and formats

With its lively, conversational tone and practical focus, this new edition mixes applied and theoretical aspects for a solid introduction to cryptography and security, including the latest  Read more...


(not yet rated) 0 with reviews - Be the first.

More like this


Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...


Document Type: Book
All Authors / Contributors: Wade Trappe; Lawrence C Washington
ISBN: 0131862391 9780131862395 0131981994 9780131981997
OCLC Number: 255687969
Notes: Includes bibliographical references and index
Description: XIV, 577 S graph. Darst
Contents: 1 Overview Secure Communications. Cryptographic Applications 2 Classical Cryptosystems. Shift Ciphers. Affine Ciphers. The Vigen'ere Cipher. Substitution Ciphers. Sherlock Holmes. The Playfair and ADFGX Ciphers. Block Ciphers. Binary Numbers and ASCII. One-Time Pads. Pseudo-random Bit Generation. LFSR Sequences. Enigma. Exercises. Computer Problems. 3 Basic Number Theory. Basic Notions. Solving ax + by = d. Congruences. The Chinese Remainder Theorem. Modular Exponentiation. Fermat and Euler. Primitive Roots. Inverting Matrices Mod n. Square Roots Mod n. Legendre and Jacobi Symbols. Finite Fields. Continued Fractions. Exercises. Computer Problems. 4 The Data Encryption Standard Introduction. A Simplified DES-Type Algorithm. Differential Cryptanalysis. DES. Modes of Operation. Breaking DES. Meet-in-the-Middle Attacks. Password Security. Exercises. 5 AES: Rijndael The Basic Algorithm. The Layers. Decryption. Design Considerations. 6 The RSA Algorithm The RSA Algorithm. Attacks on RSA. Primality Testing. Factoring. The RSA Challenge. An Application to Treaty Verification. The Public Key Concept. Exercises. Computer Problems 7 Discrete Logarithms Discrete Logarithms. Computing Discrete Logs. Bit Commitment Diffie-Hellman Key Exchange. ElGamal Public Key Cryptosystems. Exercises. Computer Problems. 8 Hash Functions Hash Functions. A Simple Hash Example. The Secure Hash Algorithm. Birthday Attacks. Multicollisions. The Random Oracle Model. Using Hash Functions to Encrypt. 9 Digital Signatures RSA Signatures. The ElGamal Signature Scheme. Hashing and Signing. Birthday Attacks on Signatures. The Digital Signature Algorithm. Exercises. Computer Problems. 10 Security Protocols Intruders-in-the-Middle and Impostors. Key Distribution. Kerberos Public Key Infrastructures (PKI). X.509 Certificates. Pretty Good Privacy. SSL and TLS. Secure Electronic Transaction. Exercises. 11 Digital Cash Digital Cash. Exercises. 12 Secret Sharing Schemes Secret Splitting. Threshold Schemes. Exercises. Computer Problems. 13 Games Flipping Coins over the Telephone. Poker over the Telephone. Exercises. 14 Zero-Knowledge Techniques The Basic Setup. The Feige-Fiat-Shamir Identification Scheme. Exercises. 15 Information Theory Probability Review. Entropy. Huffman Codes. Perfect Secrecy. The Entropy of English. Exercises. 16 Elliptic Curves The Addition Law. Elliptic Curves Mod n. Factoring with Elliptic Curves. Elliptic Curves in Characteristic 2. Elliptic Curve Cryptosystems. Identity-Based Encryption. Exercises. Computer Problems. 17 Lattice Methods Lattices. Lattice Reduction. An Attack on RSA. NTRU. Exercises 18 Error Correcting Codes Introduction. Error Correcting Codes. Bounds on General Codes. Linear Codes. Hamming Codes. Golay Codes. Cyclic Codes. BCH Codes. Reed-Solomon Codes. The McEliece Cryptosystem. Other Topics. Exercises. Computer Problems. 19 Quantum Techniques in Cryptography A Quantum Experiment. Quantum Key Distribution. Shor's Algorithm. 4 Exercises. Mathematica Examples Maple Examples MATLAB Examples Further Reading Bibliography Index Engineers
Responsibility: Wade Trappe, Lawrence C. Washington
More information:


User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...


All user tags (1)

View most popular tags as: tag list | tag cloud

  • IT  (by 1 person)

Similar Items

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data

Primary Entity

<> # Introduction to cryptography : with coding theory
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "255687969" ;
    library:placeOfPublication <> ;
    library:placeOfPublication <> ; # Upper Saddle River, NJ
    schema:about <> ; # Kryptologie
    schema:about <> ; # Codierungstheorie ; SWD-ID: 41394057
    schema:about <> ; # Coding theory
    schema:about <> ; # Cryptography
    schema:about <> ; # Coding theory
    schema:about <> ; # Cryptography
    schema:about <> ; # Codierung
    schema:about <> ;
    schema:bookEdition "2nd ed" ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <> ; # Lawrence C. Washington
    schema:creator <> ; # Wade Trappe
    schema:datePublished "2006" ;
    schema:exampleOfWork <> ;
    schema:inLanguage "en" ;
    schema:name "Introduction to cryptography : with coding theory" ;
    schema:productID "255687969" ;
    schema:publication <> ;
    schema:publisher <> ; # Pearson Prentice Hall
    schema:workExample <> ;
    schema:workExample <> ;
    wdrs:describedby <> ;

Related Entities

<> # Pearson Prentice Hall
    a bgn:Agent ;
    schema:name "Pearson Prentice Hall" ;

<> # Upper Saddle River, NJ
    a schema:Place ;
    schema:name "Upper Saddle River, NJ" ;

<> # Codierungstheorie ; SWD-ID: 41394057
    a schema:Intangible ;
    schema:name "Codierungstheorie ; SWD-ID: 41394057" ;

<> # Coding theory
    a schema:Intangible ;
    schema:name "Coding theory" ;

<> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography" ;

<> # Coding theory
    a schema:Intangible ;
    schema:name "Coding theory" ;

<> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography" ;

<> # Wade Trappe
    a schema:Person ;
    schema:familyName "Trappe" ;
    schema:givenName "Wade" ;
    schema:name "Wade Trappe" ;

<> # Lawrence C. Washington
    a schema:Person ;
    schema:familyName "Washington" ;
    schema:givenName "Lawrence C." ;
    schema:name "Lawrence C. Washington" ;

    a schema:ProductModel ;
    schema:isbn "0131862391" ;
    schema:isbn "9780131862395" ;

    a schema:ProductModel ;
    schema:bookFormat schema:Paperback ;
    schema:isbn "0131981994" ;
    schema:isbn "9780131981997" ;

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.