Prêtable
Titre : | Basic methods of cryptography |
Titre original: | Méthodes de base de la cryptographie |
Auteurs : | Jan.C.A. Van der lubbe ; Gree Steve, Traducteur |
Type de document : | texte imprimé |
Editeur : | London [U.K] : Cambridge University Press, 1998 |
ISBN/ISSN/EAN : | 978-0-521-55559-3 |
Format : | 229 p. / ill.; couv. en coul. / 24 cm. |
Langues: | Anglais |
Langues originales: | Anglais |
Index. décimale : | 005.8 (Sécurité des données (pare-feux, protection contre le piratage informatique, sécurité des réseaux, sécurité informatique)) |
Catégories : | |
Mots-clés: | Cryptographie ; Basic ; Computer security ; Data encryption |
Résumé : |
This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transmission of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. In all these cases there is a growing need for the protection of information to safeguard economic interests, to prevent fraud and to ensure privacy. In this book, the fundamentals of secure storage and transportation of information are described. Among other things, attention is given to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, which are suitable for data security, to methods for authentication, data integrity and digital signatures, key management and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers.
|
Note de contenu : |
Sommaire :
Chapitre 1: Introduction to cryptology Chapitre 2: Classical cipher systems Chapitre 3: The information théoretical approach Chapitre 4: The data encryption standard Chapitre 5: Shift registres Chapitre 6: Public key systems Chapitre 7: Authentication and integrity Chapitre 8: Key management and network security |
Exemplaires (1)
Cote | Support | Localisation | Section | Disponibilité |
---|---|---|---|---|
T8/1515 | Livre | Bibliothèque de la Faculté de Technologie | Section documentaire | Disponible |