Home > Computing and Information Technology > Computer security > Data encryption > Learning and Experiencing Cryptography with CrypTool and SageMath
19%
Learning and Experiencing Cryptography with CrypTool and SageMath

Learning and Experiencing Cryptography with CrypTool and SageMath

          
5
4
3
2
1

International Edition


Premium quality
Premium quality
Bookswagon upholds the quality by delivering untarnished books. Quality, services and satisfaction are everything for us!
Easy Return
Easy return
Not satisfied with this product! Keep it in original condition and packaging to avail easy return policy.
Certified product
Certified product
First impression is the last impression! Address the book’s certification page, ISBN, publisher’s name, copyright page and print quality.
Secure Checkout
Secure checkout
Security at its finest! Login, browse, purchase and pay, every step is safe and secured.
Money back guarantee
Money-back guarantee:
It’s all about customers! For any kind of bad experience with the product, get your actual amount back after returning the product.
On time delivery
On-time delivery
At your doorstep on time! Get this book delivered without any delay.
Quantity:
Add to Wishlist

About the Book

This book provides a broad overview of cryptography and enables cryptography for trying out. It emphasizes the connections between theory and practice, focuses on RSA for introducing number theory and PKI, and links the theory to the most current recommendations from NIST and BSI. The book also enables readers to directly try out the results with existing tools available as open source. It is different from all existing books because it shows very concretely how to execute many procedures with different tools. The target group could be self-learners, pupils and students, but also developers and users in companies. All code written with these open-source tools is available. The appendix describes in detail how to use these tools. The main chapters are independent from one another. At the end of most chapters, you will find references and web links. The sections have been enriched with many footnotes. Within the footnotes you can see where the described functions can be called and tried within the different CrypTool versions, within SageMath or within OpenSSL.

Table of Contents:
Introduction   1 Ciphers and Attacks against Them 1.1 Importance of cryptology 1.2 Symmetric encryption 1.3 Asymmetric encryption 1.4 Hybrid procedures 1.5 Kerckhoffs’ principle 1.6 Key spaces – theoretical and practical view 1.7 Attack types and security definitions 1.8 Best known attacks on given ciphers 1.9 Algorithm types and self-made ciphers 1.10 Further references / Recommended books 1.11 AES visualizations/implementations 1.12 Educational examples for symmetric ciphers using SageMath   2 P&P and Pre-Computer Ciphers 2.1 Transposition ciphers 2.2 Substitution ciphers 2.3 Combining substitution and transposition 2.4 Further P&P methods (including new ones) 2.5 Hagelin machines as sample for pre-computer ciphers 2.6 Ciphers defined by ACA 2.7 Samples of open-access publications on cracking classical ciphers 2.8 Examples using SageMath 3 Historical Cryptology 3.1 Introduction 3.2 Analyzing historical ciphers – from collection to interpretation 3.3 Collection of manuscripts and creation of metadata 3.4 Transcription 3.5 Cryptanalysis 3.6 Contextualization and interpretation: Historical and philological analysis 3.7 Conclusion   4 Prime Numbers 4.1 What are prime numbers? 4.2 Prime numbers in mathematics 4.3 How many prime numbers are there? 4.4 The search for extremely large primes 4.5 Prime number tests 4.6 Special types of numbers and the search for a formula for primes 4.7 Density and distribution of the primes 4.8 Outlook 4.9 Notes about primes 4.10 Number of prime numbers in various intervals 4.11 Indexing prime numbers (n-th prime number) 4.12 Orders of magnitude / dimensions in reality 4.13 Special values of the binary and decimal system 4.14 Visualization of the quantity of primes in higher ranges 4.15 Examples using SageMath   5 Introduction to Elementary Number Theory with Examples 5.1 Mathematics and cryptography 5.2 Introduction to number theory 5.3 Prime numbers and the first fundamental theorem of elementary number theory 5.4 Divisibility, modulus and remainder classes 5.5 Calculations with finite sets 5.6 Examples of modular calculations 5.7 Groups and modular arithmetic in Zn and Z 5.8 Euler function, Fermat’s little theorem and Euler-Fermat 5.9 Multiplicative order and primitive roots 5.10 Proof of the RSA procedure with Euler-Fermat 5.11 Security aspects regarding the security of practical RSA implementations 5.12 Considerations regarding the security of the RSA algorithm 5.13 Applications of asymmetric cryptography using numerical examples 5.14 The RSA procedure with actual numbers 5.15 Didactic comments on modulo subtraction 5.16 Base representation of numbers, estimation of length of digits 5.17 Examples using SageMath   6 The Mathematical Ideas behind Modern (Asymmetric) Cryptography 6.1 One way functions with trapdoor and complexity classes 6.2 Knapsack problem as a basis for public-key procedures 6.3 Decomposition into prime factors as a basis for public-key procedures 6.4 The discrete logarithm as basis for public-key procedures 6.5 The RSA plane 6.6 Outlook   7 Hash Functions, Digital Signatures, and PKIs 7.1 Hash functions 7.2 Digital signatures 7.3 RSA signatures 7.4 DSA signatures 7.5 Public-key certification   8 Elliptic-Curve Cryptography (ECC) 8.1 Elliptic-curve cryptography – a high-performance substitute for RSA? 8.2 Elliptic curves – history 8.3 Elliptic curves – mathematical basics 8.4 Elliptic curves in cryptography 8.5 Operating on the elliptic curve 8.6 Security of elliptic-curve cryptography: the ECDLP 8.7 Encryption and signing with elliptic curves 8.8 Factorization using elliptic curves 8.9 Implementing elliptic curves for educational purposes 8.10 Patent aspects 8.11 Elliptic curves in use   9 Foundations of Modern Symmetric Encryption 9.1 Boolean functions 9.2 Block ciphers 9.3 Stream ciphers 9.4 Table of SageMath examples in this chapter   10 Homomorphic Ciphers 10.1 Origin of the term “homomorphic” 10.2 Decryption function is a homomorphism 10.3 Classification of homomorphic methods 10.4 Examples of homomorphic pre-FHE ciphers 10.5 Applications 10.6 Homomorphic methods in CrypTool   11 Lightweight Introduction to Lattices 11.1 Preliminaries 11.2 Equations 11.3 Systems of linear equations 11.4 Matrices 11.5 Vectors 11.6 Equations – revisited 11.7 Vector spaces 11.8 Lattices 11.9 Lattices and RSA 11.10 Lattice basis reduction 11.11 PQC standardization   12 Solving Discrete Logarithms and Factoring 12.1 Generic algorithms for the discrete logarithm problem in any group 12.2 Best algorithms for prime fields Fp 12.3 Best known algorithms for extension fields Fpn and recent advances 12.4 Best known algorithms for factoring integers 12.5 Best known algorithms for elliptic curves 12.6 Possibility of embedded backdoors in cryptographic keys 12.7 Conclusion: Advice for cryptographic infrastructure   13 Future Use of Cryptography 13.1 Widely used schemes 13.2 Preparing for tomorrow 13.3 New mathematical problems 13.4 New signatures 13.5 Quantum cryptography – a way out of the dead end? 13.6 Post-Quantum Cryptography (PQC) 13.7 Conclusion


Best Sellers


Product Details
  • ISBN-13: 9781685690175
  • Publisher: Artech House Publishers
  • Publisher Imprint: Artech House Publishers
  • Edition: Unabridged edition
  • Language: English
  • Returnable: Y
  • Weight: 1663 gr
  • ISBN-10: 1685690173
  • Publisher Date: 31 Jan 2024
  • Binding: Hardback
  • Height: 185 mm
  • No of Pages: 640
  • Spine Width: 42 mm
  • Width: 264 mm


Similar Products

How would you rate your experience shopping for books on Bookswagon?

Add Photo
Add Photo

Customer Reviews

REVIEWS           
Click Here To Be The First to Review this Product
Learning and Experiencing Cryptography with CrypTool and SageMath
Artech House Publishers -
Learning and Experiencing Cryptography with CrypTool and SageMath
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Learning and Experiencing Cryptography with CrypTool and SageMath

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book
    Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals


    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!
    ASK VIDYA