Book description
This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required
Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.
The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.
- Concisely explains complex formulas and equations and makes the math easy
- Teaches even the information security novice critical encryption skills
- Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world
Table of contents
- Cover
- Title Page
- Copyright Page
- Dedication
- About the Author
- Contents at a Glance
- Contents
- Acknowledgments
- Introduction
-
PART I Foundations
- CHAPTER 1 History of Cryptography to the 1800s
- CHAPTER 2 History of Cryptography from the 1800s
- CHAPTER 3 Basic Information Theory
- CHAPTER 4 Essential Number Theory and Discrete Math
- CHAPTER 5 Essential Algebra
-
PART II Symmetric Ciphers and Hashes
- CHAPTER 6 Feistel Networks
- CHAPTER 7 Substitution-Permutation Networks
- CHAPTER 8 S-Box Design
- CHAPTER 9 Cryptographic Hashes
- PART III Asymmetric Ciphers
-
PART IV Applications
- CHAPTER 12 Random Number Generators
- CHAPTER 13 Secure Sockets Layer/Transport Layer Security Protocol
- CHAPTER 14 Virtual Private Networks
- CHAPTER 15 Military Applications
- CHAPTER 16 Steganography
- CHAPTER 17 Cryptanalysis
- CHAPTER 18 Cryptographic Backdoors
- CHAPTER 19 The Future of Cryptography
- APPENDIX Implementing Cryptography
- Index
Product information
- Title: Modern Cryptography: Applied Mathematics for Encryption and Information Security
- Author(s):
- Release date: October 2015
- Publisher(s): McGraw-Hill
- ISBN: 9781259588099
You might also like
book
Modern Cryptography for Cybersecurity Professionals
As a cybersecurity professional, discover how to implement cryptographic techniques to help your organization mitigate the …
book
Implementing SSL/TLS Using Cryptography and PKI
Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a …
book
Security in Computing
The New State of the Art in Information Security: Now Covers Cloud Computing, the Internet of …
book
Mastering Linux Security and Hardening - Second Edition
A comprehensive guide to securing your Linux system against cyberattacks and intruders Key Features Deliver a …