Published by John Wiley & Sons Inc, 2007
ISBN 10: 047011486X ISBN 13: 9780470114865
Language: English
Seller: THE SAINT BOOKSTORE, Southport, United Kingdom
Hardback. Condition: New. New copy - Usually dispatched within 4 working days. 752.
Seller: Ria Christie Collections, Uxbridge, United Kingdom
£ 114.22
Convert currencyQuantity: Over 20 available
Add to basketCondition: New. In.
Published by Wiley-Blackwell 2007-05-18, 2007
ISBN 10: 047011486X ISBN 13: 9780470114865
Language: English
Seller: Chiron Media, Wallingford, United Kingdom
£ 113.14
Convert currencyQuantity: Over 20 available
Add to basketHardcover. Condition: New.
£ 35.28
Convert currencyQuantity: 1 available
Add to baskethardcover. Condition: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority!
£ 130.21
Convert currencyQuantity: 2 available
Add to basketBuch. Condition: Neu. Neuware - A case-based approach to cryptanalysis that explains how and why attacks can happenApplied Cryptanalysis focuses on practical attacks on real-world ciphers. Using detailed case studies, the authors demonstrate how modern cryptographic systems are broken, and they do so with a minimum of complex mathematics and technical jargon. All major classes of attacks are covered, providing IT professionals with the knowledge necessary for effective security implementation within their organizations. Each chapter concludes with a series of problems that enables the reader to practice and fine-tune their own cryptanalysis skills. Applied Cryptanalysis can serve as a textbook for a cryptanalysis course or for independent study.The text is organized around four major themes:\*Classic Crypto offers an overview of a few classical cryptosystems, introducing and illustrating the basic principles, concepts, and vocabulary. The authors then cover World War II cipher machines, specifically the German Enigma, Japanese Purple, and American Sigaba.\*Symmetric Ciphers analyzes shift registers and correlation attacks, as well as attacks on three specific stream ciphers: ORYX, RC4 (as used in WEP), and PKZIP. In addition, block ciphers are studied: Hellman's Time-Memory Trade-Off attack is discussed and three specific block ciphers are analyzed in detail (CMEA, Akelarre, and FEAL).\*Hash Functions presents hash function design, birthday attacks, and the 'Nostradamus' attack. Then the MD4 attack is examined, which serves as a precursor for the authors' highly detailed analysis of the recent attack on MD5.\*Public Key Crypto includes an overview of several public key cryptosystems including the knapsack, Diffie-Hellman, Arithmetica, RSA, Rabin cipher, NTRU, and ElGamal. Factoring and discrete log attacks are analyzed, and the recent timing attacks on RSA are discussed in detail.Clear and concise, this practical case-based approach to cryptanalysis is a valuable and timely resource.
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 1st edition. 424 pages. 9.75x6.50x1.00 inches. In Stock.
Seller: Lucky's Textbooks, Dallas, TX, U.S.A.
£ 99.05
Convert currencyQuantity: Over 20 available
Add to basketCondition: New.
Published by John Wiley and Sons Ltd, 2007
ISBN 10: 047011486X ISBN 13: 9780470114865
Language: English
Seller: OM Books, Sevilla, SE, Spain
£ 283.54
Convert currencyQuantity: 1 available
Add to basketCondition: Usado - bueno.
Seller: Revaluation Books, Exeter, United Kingdom
Hardcover. Condition: Brand New. 1st edition. 424 pages. 9.75x6.50x1.00 inches. In Stock. This item is printed on demand.