Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
33Activity
0 of .
Results for:
No results containing your search query
P. 1
The Laws of Cryptography With Java Code

The Laws of Cryptography With Java Code

Ratings: (0)|Views: 1,557|Likes:
Published by Adarsh
The Laws of Cryptography With Java Code
The Laws of Cryptography With Java Code

More info:

Published by: Adarsh on Oct 06, 2009
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

04/09/2013

pdf

text

original

 
The Laws ofCryptographywith Java Code
by Neal R. Wagner
 
Copyrightc
 
2003 by Neal R. Wagner. All rights reserved.
Permission is granted to retrieve a single electronic copy of this book for personal use, but thepermission does not extend to printing a copy of the book or to making a copy, electronic or inany other form, for any other than personal use.
 
Table of ContentsParts and Chapters
Foreword . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xiIntroduction . . . . . . . . . . . . . . . . . . . . . . . . . . . xiii
I. Preliminaries . . . . . . . . . . . . . . . . . . . . . 2
1. CryptographersFavorites . . . . . . . . . . . . . . . . . . 32. CryptographersFavorite Algorithms . . . . . . . . . . . . 14
II. Coding and Information Theory . . . . . . . . . . . . 22
3. Coding and Information Theory . . . . . . . . . . . . . . 234. Visualizing Channel Capacity . . . . . . . . . . . . . . . 315. The Huffman Code for Compression . . . . . . . . . . . . 356. The Hamming Code for Error Correction . . . . . . . . . . 447. Coping with Decimal Numbers . . . . . . . . . . . . . . . 488. Verhoeff’s Decimal Error Detection . . . . . . . . . . . . . 54
III. Introduction to Cryptography . . . . . . . . . . . . . 60
9. Cryptograms and Terminology . . . . . . . . . . . . . . . 6110. The One-Time Pad . . . . . . . . . . . . . . . . . . . . 6611. Conventional Block Cipher Cryptosystems . . . . . . . . . . 70
??. Conventional Stream Cipher Cryptosystems
IV. Public Key Cryptography . . . . . . . . . . . . . . . 78
12. Public Key Distribution Systems . . . . . . . . . . . . . . 7913. Public Key Cryptography: Knapsacks . . . . . . . . . . . . 8214. The RSA Public Key Cryptosystem . . . . . . . . . . . . . 8615. Rabins Version of RSA . . . . . . . . . . . . . . . . . . 93
??. Elliptic Curve Cryptosystems??. Other Public Key Cryptosystems
V. Random Number Generation . . . . . . . . . . . . . 98
16. Traditional Random Number Generators . . . . . . . . . . 9917. Random Numbers From Chaos Theory . . . . . . . . . . . 10618. Statistical Tests and Perfect Generators . . . . . . . . . . . 112
VI. The Advanced Encryption Standard (AES) . . . . . . . . 114

Activity (33)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
jkl316 liked this
Alper Öz liked this
jkl316 liked this
jkl316 liked this
Vu Muruganandham liked this
chuki3578 liked this
palkens1989 liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->