Cryptography : Theory and Practice, 4/e (Hardcover)
暫譯: 密碼學:理論與實踐,第4版(精裝本)
Douglas Robert Stinson, Maura Paterson
- 出版商: CRC
- 出版日期: 2018-08-20
- 定價: $3,960
- 售價: 8.0 折 $3,168
- 語言: 英文
- 頁數: 598
- 裝訂: Hardcover
- ISBN: 1138197017
- ISBN-13: 9781138197015
-
相關分類:
資訊安全
-
其他版本:
Cryptography: Theory and Practice 4th Edition
立即出貨 (庫存 < 3)
買這商品的人也買了...
-
$1,350$1,323 -
$940$700 -
$2,565Applied Cryptography: Protocols, Algorithms and Source Code in C 20th Anniversary Edition
-
$1,700$1,615 -
$780$616 -
$403Zabbix 監控系統深度實踐, 2/e
-
$550$435 -
$780$616 -
$1,900$1,805 -
$500$425 -
$580$458 -
$580$452 -
$690$538 -
$1,050Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
-
$3,450$3,278 -
$3,450$3,278 -
$709Zabbix 企業級分佈式監控系統, 2/e
-
$880$695 -
$680$537 -
$505Prometheus 監控技術與實踐
-
$2,730$2,594 -
$414$393 -
$648$616 -
$420$331 -
$607現代密碼學及其應用
商品描述
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.
The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.
Key Features of the Fourth Edition:
- New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).
- New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).
- New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).
- An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.
- Interesting attacks on cryptosystems, including:
- padding oracle attack
- correlation attacks and algebraic attacks on stream ciphers
- attack on the DUAL-EC random bit generator that makes use of a trapdoor.
- A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.
- Methods of key distribution in sensor networks.
- The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.
- The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.
- The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.
商品描述(中文翻譯)
透過三個版本,密碼學:理論與實務受到教師和學生的廣泛歡迎。它提供了該主題基本原理的全面入門,同時介紹了密碼學的最新進展。
作者對於保護全球範圍內看似無限且不斷增加的信息流通所必需的方法和協議進行了全面而深入的探討。
第四版的主要特色:
- 新增關於後量子密碼學這一令人興奮的新興領域的章節(第9章)。
- 新增高層次的非技術性概述,介紹密碼學的目標和工具(第1章)。
- 新增數學附錄,總結數論和代數的定義及主要結果(附錄A)。
- 擴展了對流密碼的處理,包括常見的設計技術以及對Trivium的介紹。
- 有趣的密碼系統攻擊,包括:
- 填充Oracle攻擊
- 對流密碼的相關性攻擊和代數攻擊
- 對DUAL-EC隨機位元生成器的攻擊,利用了陷門。
- 對哈希函數的海綿結構及其在新SHA-3哈希標準中的應用進行了探討。
- 在感測器網絡中的密鑰分配方法。
- 視覺密碼學的基本概念,提供了一種安全的方法將秘密視覺信息分割成片段(份額),這些片段可以在後續合併以重建秘密。
- 加密貨幣的基本技術,如在比特幣和區塊鏈中使用的技術。
- 在消息協議(如Signal)中使用的新方法的基本概念,包括可否認性和Diffie-Hellman密鑰增量技術。