Book description
For courses in Cryptography, Network Security, and Computer Security.
This ISBN is for the Pearson eText access card.
A broad spectrum of cryptography topics, covered from a mathematical point of view
Extensively revised and updated, the 3rd Edition of Introduction to Cryptography with Coding Theory mixes applied and theoretical aspects to build a solid foundation in cryptography and security. The authors’ lively, conversational tone and practical focus inform a broad coverage of topics from a mathematical point of view, and reflect the most recent trends in the rapidly changing field of cryptography.
Key to the new edition was transforming from a primarily print-based resource to a digital learning tool. The eText is packed with content and tools, such as interactive examples, that help bring course content to life for students and enhance instruction.
Pearson eText is a simple-to-use, mobile-optimized, personalized reading experience. It lets students highlight, take notes, and review key vocabulary all in one place, even when offline. Seamlessly integrated videos and other rich media engage students and give them access to the help they need, when they need it.
Educators can easily customize the table of contents, schedule readings, and share their own notes with students so they see the connection between their eText and what they learn in class – motivating them to keep reading, and keep learning. And, reading analytics offer insight into how students use the eText, helping educators tailor their instruction.
NOTE: Pearson eText is a fully digital delivery of Pearson content and should only be purchased when required by your instructor. This ISBN is for the Pearson eText access card. In addition to your purchase, you will need a course invite link, provided by your instructor, to register for and use Pearson eText.
Table of contents
- Introduction to Cryptography with Coding Theory
- Contents
- Preface
- Chapter 1 Overview of Cryptography and Its Applications
- Chapter 2 Classical Cryptosystems
-
Chapter 3 Basic Number Theory
- 3.1 Basic Notions
- 3.2 The Extended Euclidean Algorithm
- 3.3 Congruences
- 3.4 The Chinese Remainder Theorem
- 3.5 Modular Exponentiation
- 3.6 Fermat’s Theorem and Euler’s Theorem
- 3.7 Primitive Roots
- 3.8 Inverting Matrices Mod n
- 3.9 Square Roots Mod n
- 3.10 Legendre and Jacobi Symbols
- 3.11 Finite Fields
- 3.12 Continued Fractions
- 3.13 Exercises
- 3.14 Computer Problems
- Chapter 4 The One-Time Pad
- Chapter 5 Stream Ciphers
- Chapter 6 Block Ciphers
- Chapter 7 The Data Encryption Standard
- Chapter 8 The Advanced Encryption Standard: Rijndael
- Chapter 9 The RSA Algorithm
- Chapter 10 Discrete Logarithms
- Chapter 11 Hash Functions
- Chapter 12 Hash Functions: Attacks and Applications
- Chapter 13 Digital Signatures
- Chapter 14 What Can Go Wrong
- Chapter 15 Security Protocols
- Chapter 16 Digital Cash
- Chapter 17 Secret Sharing Schemes
- Chapter 18 Games
- Chapter 19 Zero-Knowledge Techniques
- Chapter 20 Information Theory
- Chapter 21 Elliptic Curves
- Chapter 22 Pairing-Based Cryptography
- Chapter 23 Lattice Methods
- Chapter 24 Error Correcting Codes
- Chapter 25 Quantum Techniques in Cryptography
-
Appendix A Mathematica® Examples
- A.1 Getting Started with Mathematica
- A.2 Some Commands
- A.3 Examples for Chapter 2
- A.4 Examples for Chapter 3
- A.5 Examples for Chapter 5
- A.6 Examples for Chapter 6
- A.7 Examples for Chapter 9
- A.8 Examples for Chapter 10
- A.9 Examples for Chapter 12
- A.10 Examples for Chapter 17
- A.11 Examples for Chapter 18
- A.12 Examples for Chapter 21
-
Appendix B Maple® Examples
- B.1 Getting Started with Maple
- B.2 Some Commands
- B.3 Examples for Chapter 2
- B.4 Examples for Chapter 3
- B.5 Examples for Chapter 5
- B.6 Examples for Chapter 6
- B.7 Examples for Chapter 9
- B.8 Examples for Chapter 10
- B.9 Examples for Chapter 12
- B.10 Examples for Chapter 17
- B.11 Examples for Chapter 18
- B.12 Examples for Chapter 21
-
Appendix C MATLAB® Examples
- C.1 Getting Started with MATLAB
- C.2 Examples for Chapter 2
- C.3 Examples for Chapter 3
- C.4 Examples for Chapter 5
- C.5 Examples for Chapter 6
- C.6 Examples for Chapter 9
- C.7 Examples for Chapter 10
- C.8 Examples for Chapter 12
- C.9 Examples for Chapter 17
- C.10 Examples for Chapter 18
- C.11 Examples for Chapter 21
-
Appendix D Sage Examples
- D.1 Computations for Chapter 2
- D.2 Computations for Chapter 3
- D.3 Computations for Chapter 5
- D.4 Computations for Chapter 6
- D.5 Computations for Chapter 9
- D.6 Computations for Chapter 10
- D.7 Computations for Chapter 12
- D.8 Computations for Chapter 17
- D.9 Computations for Chapter 18
- D.10 Computations for Chapter 21
- Appendix E Answers and Hints for Selected Odd-Numbered Exercises
- Appendix F Suggestions for Further Reading
- Bibliography
- Index
Product information
- Title: Introduction to Cryptography with Coding Theory, 3rd Edition
- Author(s):
- Release date: February 2020
- Publisher(s): Pearson
- ISBN: 9780136758181
You might also like
book
Cryptography Algorithms
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms …
book
Introduction to Cryptography with Open-Source Software
This text illustrates algorithms and cryptosystems using examples and the open-source computer algebra system of Sage. …
book
Practical Cryptography in Python: Learning Correct Cryptography by Example
Develop a greater intuition for the proper use of cryptography. This book teaches the basics of …
book
Applied Cryptography: Protocols, Algorithms and Source Code in C, 20th Anniversary Edition
From the world's most renowned security technologist, Bruce Schneier, this 20th Anniversary Edition is the most …