MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Basic methods of cryptography / Jan C.A. van der Lubbe ; translated by Steve Gee.

By: Lubbe, J. C. A. van der (Jan C. A.).
Contributor(s): Gee, Steve.
Material type: materialTypeLabelBookPublisher: Cambridge, UK ; New York : Cambridge University Press, 1998Description: xiv, 229 p. : ill. ; 24 cm. + pbk.ISBN: 0521554802 ; 0521555590 .Subject(s): Computer security | Data encryption (Computer science)DDC classification: 005.82
Contents:
Introduction to cryptology -- Classical cipher systems -- The information theoretical approach -- The data encryption standard -- Shift registers -- Public key systems -- Authentication and integrity -- Key management and network security.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.82 (Browse shelf(Opens below)) 1 Available 00069032
Total holds: 0

Enhanced descriptions from Syndetics:

This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. In all these cases there is a growing need for the protection of information to safeguard economic interests, to prevent fraud and to ensure privacy. In this book, the fundamentals of secure storage and transportation of information are described. Among other things, attention is given to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, which are suitable for data security, to methods for authentication, data integrity and digital signatures, key management and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.

Bibliography: (pages 219-225) and index.

Introduction to cryptology -- Classical cipher systems -- The information theoretical approach -- The data encryption standard -- Shift registers -- Public key systems -- Authentication and integrity -- Key management and network security.

Translation of: Basismethoden cryptografie.

Table of contents provided by Syndetics

  • 1 Introduction to cryptology
  • 2 Classical cipher systems
  • 3 The information theoretical approach
  • 4 The data encryption standard
  • 5 Shift-registers
  • 6 Public cipher systems
  • 7 Authentication and integrity
  • 8 Key management and network security

Reviews provided by Syndetics

CHOICE Review

This review must be prefaced by the statement that the reviewer is not a specialist in the discipline of cryptography. Nonetheless, his background covers much of the relevant mathematics and engineering. With only minor flaws, van der Lubbe's book is a gentle, but highly substantial, introduction to the world and techniques of cryptography and cryptanalysis. The discussions highlight the rationale for secure coding as contrasted to the need to transfer information. Here the lucidity of the presentation is beyond reproach. Most of the book is given over to the presentation of specific and, indeed, current methods of encryption and decryption, together with analyses of the relative security of the methods. Particularly impressive are, in this reviewer's experience, the most understandable presentation of DES, the Data Encryption Standard, and RSA coding (the main public key method). The mathematics background required of the reader is varied although much is summarized in highly condensed form. Rather than having specific knowledge, the reader will find it useful to have some familiarity with linear algebra, probability (with a bit of statistical terminology), and number theory. Upper-division undergraduates through professionals. W. Abikoff; University of Connecticut

Powered by Koha