- Out-of-Stock
Products
Categories
- Main categories
-
- 3D PRINTING
- ACADEMIC OFFER
- ARDUINO
- AUTOMATION
- BOOKS
- DIY KITS
- AVT kits
- Audio
- Car
- Chargers
- Clocks, timers and schedule switches
- Communication
- Converters
- Development kits and modules
- Displays
- Electronic games
- Generators
- Hobbies and fun
- House
- Interfaces
- Light effects
- meters
- PC
- Power Supplies
- Pre-programmed circuits
- Printed circuit boards (PCB)
- Programmers
- Regulators, controllers
- Remote control
- Starter sets Ośla Łączka
- Starting sets for beginners
- Workshop tools
- Audio
- Other sets
- TOP-Q kits
- Totem
- UGears
- Velleman
- AVT kits
- EBOOKS
- ELECTRONICS
- Cables
- Cameras and accessories
- Communication
- Conductive materials
- Connectors
- ARK connectors (Terminal Block)
- Coaxial connectors (RF)
- Connectors
- Crocodile clip
- D-Sub drawer connectors
- DC power connectors
- FFC/FPC ZIF connectors
- Goldpin connectors
- IDC connectors
- JACK connectors
- JST connectors
- Jumpers
- Memory cards slots
- Other connectors
- Pogo pin
- RJ45 sockets
- Slip ring connector
- Supports
- Szybkozłącza
- USB connectors
- Cooling
- Displays
- Electronic modules
- A/D and D/A converters
- Audio
- Barcode readers
- CAN converters
- Converters USB - UART / RS232
- Data logger
- DDS/PLL generators
- Digital potentiometers
- Encoders
- Expanders of the I/O
- Fingerprint readers
- HMI modules
- Image and video
- JTAG accessories
- Keyboards, buttons
- LED drivers
- Memory card readers
- Memory modules
- Modules with power outputs
- Motor controllers
- Power modules
- RS485 converters
- RTC modules
- Servo Controllers
- TSOP infrared receivers
- USB Converters - I2C / 1-Wire / SPI
- Voltage converters
- Gadgets
- GPS
- Intelligent clothes
- LED - diodes, displays, stripes
- Luminous wires and accessories
- Memory cards and other data storages
- Passive elements
- PC accessories
- Printers
- Prototype boards
- Semiconductors
- A/C converters (ADC)
- Analog systems
- Audio systems
- Bridge rectifiers
- Button
- D/A Converters (DAC)
- DDS synthesizers
- Digital circuits
- Diodes
- Drivers of motors
- DSP microprocessors
- Energy counters
- Energy harvesting
- ESD security
- IGBT drivers and bridges
- Interface systems
- LED drivers
- Logic converters
- Memory
- Microcontrollers
- Optotriacs and optocouplers
- Other
- PLL generators
- Power systems
- Programmable systems
- Resetting systems
- RF systems
- RTC systems
- Sensors
- SoC systems
- Timery
- Touch sensors
- Transistors
- Sensors
- Accelerometers
- Air humidity sensors
- Air quality sensors
- Current sensors
- Distance sensors
- Flow sensors
- Gas sensors
- Gyroscopes
- Hall sensors
- Humidity sensors
- Infrared sensors
- Light and color sensors
- Liquid level sensors
- Magnetic sensors (compasses)
- Medical sensors
- Motion sensors
- PH sensors
- Position sensors
- Pressure sensors
- Pressure sensors
- Reflection sensors
- Sensors 6DOF/9DOF/10DOF
- Sensors of liquid quality
- Temperature sensors
- Vibration sensors
- Sound transducers
- Switches and buttons
- Cables
- INTERNET OF THINGS (IoT)
- MECHANICS
- POWER
- R/C MODELLING
- RASPBERRY PI
- Accessories for Raspberry Pi
- Audio video cables for Raspberry Pi
- Case Raspberry Pi
- Cooling for Raspberry Pi
- Displays for Raspberry Pi
- Extension modules for Raspberry Pi
- Memory cards for Raspberry Pi
- Power for Raspberry Pi
- Raspberry Pi 3 model A+
- Raspberry Pi 3 model B
- Raspberry Pi 3 model B+
- Raspberry Pi 4 model B
- Raspberry Pi 400
- Raspberry Pi 5
- Raspberry Pi cameras
- Raspberry Pi Compute Module
- Raspberry Pi model A/ B+/2
- Raspberry Pi Pico
- Raspberry Pi prototyping
- Raspberry Pi Zero
- Raspberry Pi Zero 2 W
- RETIRED PRODUCTS
- ROBOTICS
- SALE
- SOFTWARE
- STARTER KITS, PROGRAMMERS, MODULES
- Alchitry FPGA
- Altera FPGA
- Analog electronics
- Atmel SAM
- Atmel Xplain
- AVR
- Banana Pi
- BeagleBone
- chipKIT
- Coral
- CPLD Xilinx
- Cubieboard
- DFRobot FireBeetle
- Feather
- Freedom (Kinetis)
- FriendlyELEC
- HummingBoard
- Intelligent clothes
- Kit with a book
- LattePanda
- LPC (NXP)
- M5Stack
- Micro:bit
- Nvidia Jetson
- Odroid
- ODYSSEY
- Orange Pi
- Other development kits
- Peripheral modules
- PIC
- Raisonance
- Raspberry Pi RP2040
- RFID
- RISC-V
- SBC Embest
- SBC MYIR
- SBC others
- SBC UDOO
- Segger programmers
- SoMLabs
- Sparkfun MicroMod
- STM32
- STM32 Discovery
- STM32 MP1
- STM32 Nucleo boards
- STM8
- Teensy
- Universal programmers
- WRTNode
- Xilinx FPGAs
- WORKSHOP
- Adhesives and gluers
- Anti-static mats (ESD)
- Chemistry
- CNC milling machines
- Crimping tools
- Dispensing needles
- Drills
- Files
- Generators
- Handles, magnifiers
- Heat-shrink tubing
- Insulation strippers
- Keys
- Knives and scissors
- Laboratory power supplies
- Laminates
- Measuring devices
- Mikroskopy
- Mini drills and grindrers
- Organizers
- Oscilloscopes and accessories
- Pliers and pincers
- Power tools
- Riveting tools and rivets
- Screwdrivers
- SMD Accessories
- Soldering
- Tapes (aluminum, kapton, copper, insulating)
- Tweezers
- Ultrasonic cleaners
- Vices
- 3D PRINTING
New products
New products
Cryptography. In theory and in practice
Free shipping
free shipping in Poland for all orders over 500 PLN
Same day shipping
If your payment will be credited to our account by 11:00
14 days for return
Each consumer can return the purchased goods within 14 days
Author: Douglas R. Stinson ISBN: 83-204-2982-X Format: B5, 438 pages Hardcover Publisher: WNT |
About the book |
This book is recognized in the world as one of the best textbooks for cryptography. It consists of three parts. The first includes classical cryptography, with a secret key, called symmetrical. The author discusses in it stream ciphers and elements of the information theory Shanonna. Describes and analyzes the DES symmetric cipher algorithm in detail. The second part is devoted to public-key cryptography, known as asymmetrical. The author discusses here the RSA algorithm, ElGamala cryptosystem along with its implementation on elliptic curves, digital signature schemes (including DSS), hash functions and key distribution algorithms, authentication algorithms and secret-sharing algorithms. The third part covers more complex issues. The author describes authentication codes, sharing secrets, pseudo-random number generation problems and zero-knowledge protocols. It is worth noting that all the presented issues are illustrated with computational examples, and cryptosystems are discussed in accordance with the generally accepted scheme: encryption method - decryption method - known methods of attack. The book is intended for IT students, maths students, cryptographers, people dealing professionally with the protection of information. Table of Contents 1. Classic cryptography 1.1. Introduction: a few simple cryptosystems 1.1.1. Cipher with offset 1.1.2. Substitution cipher 1.1.3. Affine cipher 1.1.4. Vigenere's cipher 1.1.5. Hill Cipher 1.1.6. Permutation cipher 1.1.7. Stream ciphers 1.2. Cryptanalysis 1.2.1. Cryptanalysis of affine cipher 1.2.2. Cryptanalysis of the substitution cipher 1.2.3. Cryptanalysis of the Vigenere cipher 1.2.4. Attack with known public text for Hill's encryption 1.2.5. Cryptanalysis of the LFSR based cipher 1.3. Comments exercises 2. The Shannon theory 2.1. Top secretiveness 2.2. Entropy 2.2.1. Hnffman coding and entropy 2.3. Properties of entropy 2.1. Erroneous keys and critical length 2.5. Product cryptographic systems 2.6. Comments Exercises. 3. Data encryption standard - DES 3.1. Introduction 3.2. Description DES. 3.2.1. An example of encryption in the DES system 3.3. Controversy over DES 3.4. DES in practice 3.4.1. DES operation modes 3.5. Time requirements and memory requirements - an attempt to compromise 3.6. Differential cryptanalysis 3.6.1. Attack on a 3-round DES code 3.6.2. Attack on a 6-round DES code 3.6.3. Other examples of differential cryptanalysis 3.7. Notes and bibliography exercises 4. RSA system and factorization 4.1. Introduction to public key cryptography 4.2. Still about the theory of numbers 4.2.1. The Euclidean algorithm 4.2.2. Chinese theorem on the rest 4.2.3. Other useful facts 4.3. RSA cryptographic system 4.4. RSA implementation 4.5. Probabilistic test for prime numbers 4.6. Attacks on RSA 4.6.1. Exponent of decryption 4.6.2. Partial information about bits of plaintext 4.7. Rabin's cryptographic system 4.8. Algorithms of factoring 4.8.1. Method p - 1 4.8.2. Dixon algorithm and square sieve 4.8.3. Algorithms of factoring in practice 4.9. Notes and bibliography exercises 5. Other cryptographic systems with a public key 5.1. ElGamala cryptographic system and discrete logarithms 5.1.1. Algorithms for the problem of discrete logarithms 5.1.2. Security of discrete logarithm bits 5.2. Systems based on finite bodies and elliptical curves 5.2.1. Galois bodies 5.2.2. Elliptic curves 5.3. Merkle-Hellman knapsack system 5.4. McEliece's system 5.5. Notes and bibliography exercises 6. Signature schemes 6.1. Introduction 6.2. The signature scheme of ElGamala 6.3. Digital signature standard 6.4. One-off signatures 6.5. Undeniable signatures 6.6. Unidentifiable signatures 6.7. Notes and bibliography exercises 7. Functions of a shortcut 7.1. Signatures and functions of a hash 7.2. Problem-free shortcut functions 7.3. Attack by birth day 7.4. The hash function associated with the discrete logarithm 7.5. Extended hash functions 7.6. The shortcut functions built on cryptographic systems 7.7. The MD4 hash function 7.8. Dating 7.9. Notes and bibliography exercises 8. Reconciliation and distribution of the key 8.1. Introduction 8.2. Pre-distribution of the key 8.2.1. Blom scheme 8.2.2. Diagram of the initial distribution of the Diffie-Hellman key 8.3. kerberos 8.4. Diffie Hellman key exchange protocol 8.4.1. Key exchange protocol with authentication 8.4.2. MTI key agreement protocol 8.4.3. Reconcile the key with the self-confirming key 8.5. Notes and bibliography exercises 9. Identification schemes 9.1. Introduction 9.2. Schnorr identification scheme 9.3. Okamoto identification scheme 9.4. Guillou-Quisquater identification scheme 9.4.1. Identification schemes based on identity 9.5. Transforming identification into a signature scheme 9.6. Notes and bibliography exercises 10. Authentication codes 10.1. Introduction 10.2. Calculating the probabilities of fraud 10.3. Combinatorial restrictions 10.3.1. Orthogonal matrices 10.3.2. Orthogonal matrices - constructions and limitations 10.3.3. Characterization of authentication codes 10.4. Restrictions related to entropy 10.5. Notes and bibliography exercises 11. Secret sharing schemes 11.1. Introduction: Shamira threshold scheme 11.2. Access structures and general secret sharing 11.3. The construction based on the niononic circuit 11.4. Formal definitions 11.5. Relative measure of information 11.6. Brickell construction based on a linear space 11.7. The upper limit of the relative measure of information 11.8. Construction by decomposition 11.9. Notes and bibliography exercises 12. Generating pseudo-random numbers 12.1. Introduction and examples 12.2. Indistinguishable probability distributions 12.2.1. Algorithm for predicting the next bit 12.3. Bluma-Bluma-Shuba generator 12.3.1. Security of the BBS generator 12.4. Probabilistic encryption 12.5. Notes and bibliography exercises 13. Evidence of zero knowledge 13.1. Interactive proof systems 13.2. Excellent evidence of zero knowledge 13.3. Scheme of the binding bit 13.4. Evidence of computational zero knowledge 13.5. Reasoning about zero knowledge 13.6. Notes and bibliography exercises Further reading Bibliography Index |
Other products in the same category (16)
LED display 25.40mm 1.00 "single leg 9.6 [mm], red (635nm), 18 mcd / seg (10mA), common Pb-free anode, replacement for TOS-1106BK-4N, TOS-1106BS-4N
No product available!
No product available!
No product available!
No product available!
Spring dedicated to the heating table of 3D printers. It allows you to adjust the degree of tightening the knob, and thus enables the proper leveling of the working table
No product available!
No product available!
A set of elements that allows you to build a Christmas tree decoration with flashing blue LEDs. Velleman MK100B
No product available!
No product available!
Schmid Dietmar (ed.)
No product available!
High quality XF-ABS filament for 3D printer with 1.75 mm diameter. 2 kg of wire are wound on the spool.
No product available!
Portable tBook mini oscilloscope with 8 "LCD display and touch screen. It has two measuring channels and is characterized by good measurement parameters: 150 MHz band, sampling rate of 1 GSa/s and 28 Mpts memory buffer. Micsig TO1152 Plus
No product available!
No product available!
HK NTM Prop Drive Series 28-26A 1200kv / 286w (17345)
No product available!
An evaluation kit VisionSTK-NAND contains: VisionSOM-6ULL board (variant with NAND 512 MB memory and WiFi/BT module) and VISIONCB-STD evaluation board.
No product available!
No product available!
No product available!