sitemap | contact us
      
 
  Book Series
  Journals
  Book Proposal Form
 
  Using Published Material
  Rights and Permissions
  Examination Copies
   
   
  List of Publishers
  Bargains
   
   
  Services
   
   
  About Narosa
  History
  Mission
  Group Companies
  Our Strength
  Alliances
   
   
   
 
view in print mode
Introduction to Cryptography with JavaTM Applets
Author(s): D. Bishop

ISBN:    978-81-7319-616-4 
E-ISBN:   
Publication Year:   2004
Pages:   388
Binding:   Paper Back
Dimension:   185mm x 240mm
Weight:   580


Textbook


About the book

Introduction to Cryptography with JavaTM Applets delves into the art of transforming information into cryptic messages, and explores the challenge of deciphering secret code. The author provides a distinctively balanced introduction to the mathematics of cryptography and the programming of ciphers. This fresh didactic approach demonstrates the fundamental role of powerful mathematics in modern cryptosystems, while introducing programming concepts in JavaTM, a language designed for system security. With accessible examples that engage the reader, this text fosters interactivity through online JavaTM applets that demonstrate important concepts. Readers learn the mathematical theory of cryptography, and how to write algorithms “from the ground up” to implement the theory.


Key Features

  • Offers a balanced presentation of mathematics and programming. • Contains code for alternative methods of factorization, solving the discrete logarithm problem using different techniques, executing ciphertext attacks, generating pseudorandom bit streams, producing, message digests, and more! • Provides programming exercises, mathematical exercise, proofs of results, and group exercises to help readers master cryptography concepts. • Includes interactive JavaTM applets, text files, program files, and an Instructor’s Manual on its integrated web site.



Table of Contents

Preface / The History of Cryptography / Large Integer Computing / The Integers / Linear Diophantine Equations and Linear Congruences / Linear Ciphers / System of Linear Congruences-Single Modulus / Matrix Ciphers / Systems of Linear Congruences-Multiple Moduli / Quadratic Congruences / Quadratic Ciphers / Primality Testing / Factorization Techniques / Exponential Congruences / Exponential Ciphers / Establishing Keys and Message Exchange / Cryptographic Applications / Appendix I: List of Propositions / Appendix II: Information Theory / Index




Audience

Undergraduate and Postgraduate Students


CLICK HERE


Group
| Companies | Mission | Strength | Values | History | Contact us
© Narosa Publishing House