Cybercryptography : applicable cryptography for cyberspace security /

This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 prov...

Full description

Bibliographic Details
Main Author: Yan, Song Y. (Author)
Format: Book
Language:English
Published: Cham, Switzerland : Springer, [2019]
Subjects:
LEADER 05509nam a2200565Ii 4500
001 b190bb34-b90d-4a12-b98e-c28d66033da4
005 20240811000000.0
008 181215s2019 sz ob 001 0 eng d
015 |a GBB935076  |2 bnb 
016 7 |a 019213986  |2 Uk 
019 |a 1078943112  |a 1086468991  |a 1117822732  |a 1122773562  |a 1122813686  |a 1156344948 
020 |a 3319725351 
020 |a 331972536X  |q (electronic book) 
020 |a 9783319725352  |q (print) 
020 |a 9783319725369  |q (electronic book) 
020 |z 3319725343 
020 |z 9783319725345 
024 7 |a 10.1007/978-3-319-72536-9  |2 doi 
035 |a (OCoLC)1078999410  |z (OCoLC)1078943112  |z (OCoLC)1086468991  |z (OCoLC)1117822732  |z (OCoLC)1122773562  |z (OCoLC)1122813686  |z (OCoLC)1156344948 
035 9 |a (OCLCCM-CC)1078999410 
037 |a com.springer.onix.9783319725369  |b Springer Nature 
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d GW5XE  |d OCLCF  |d CAUOI  |d YDX  |d MERER  |d YDXIT  |d UKMGB  |d OH1  |d ESU  |d UKAHL  |d LEAUB  |d CEF  |d LVT  |d LEATE  |d OCLCQ  |d VT2 
049 |a MAIN 
050 4 |a QA76.9.A25  |b Y36 2019 
072 7 |a COM031000  |2 bisacsh 
072 7 |a UMB  |2 bicssc 
072 7 |a UMB  |2 thema 
072 7 |a URY  |2 thema 
100 1 |a Yan, Song Y.,  |e author 
245 1 0 |a Cybercryptography :  |b applicable cryptography for cyberspace security /  |c Song Y. Yan 
264 1 |a Cham, Switzerland :  |b Springer,  |c [2019] 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
504 |a Includes bibliographical references and index 
505 0 |a Intro; Preface; Acknowledgments; Contents; About the Author; 1 Cyberspace Security and Cryptography; 1.1 Cyber and Cyberspace; Cyber and Cybernetics; Cyberspace; Problems for Sect. 1.1; 1.2 Cyberspace Security; Cyberspace Security; UK Cybersecurity Strategy; US and Canada's Cybersecurity Strategies; Australia and New Zealand Cybersecurity Strategies; Problems for Sect. 1.2; 1.3 Cybersecurity and Cryptography; Problems for Sect. 1.3; 1.4 Conclusions, Notes and Further Reading; References; 2 Mathematical Preliminaries; 2.1 Groups, Rings and Fields; Problems for Sect. 2.1; 2.2 Divisibility Theory 
505 8 |a Problems for Sect. 2.22.3 Arithmetic Functions; Problems for Sect. 2.3; 2.4 Congruence Theory; Problems for Sect. 2.4; 2.5 Order, Primitive Root and Index; Problems for Sect. 2.5; 2.6 Theory of Elliptic Curves; Problems for Sect. 2.6; 2.7 Conclusions, Notes and Further Reading; References; 3 Computational Preliminaries; 3.1 Classical Computability Theory; Turing Machines; The Church-Turing Thesis; Decidability and Computability; Problems for Sect. 3.1; 3.2 Classical Complexity Theory; Complexity Classes; The Cook-Karp Thesis; Problems for Sect. 3.2; 3.3 Quantum Information and Computation 
505 8 |a Problems for Sect. 3.33.4 Quantum Computability and Complexity; Problems for Sect. 3.4; 3.5 Conclusions, Notes and Further Reading; References; 4 Secret-Key Cryptography; 4.1 Secret-Key vs Public-Key Cryptography; Problems for Sect. 4.1; 4.2 Stream (Bit) Ciphers; Introduction to Stream Ciphers; The Vernam Cipher; Random Bit Generator; Problems for Sect. 4.2; 4.3 Monographic (Character) Ciphers; Caesar Cipher; Shift Transformation Ciphers; Affine Transformation Ciphers; Problems for Sect. 4.3; 4.4 Polygraphic (Block) Ciphers; Problems for Sect. 4.4; 4.5 Exponentiation Ciphers 
505 8 |a Residuosity Based CryptographyZero-Knowledge Proof; Problems and Exercises for Sect. 5.2; 5.3 Quantum Attacks of Factoring Based Cryptography; Relationships Between Factoring and Factoring Based Cryptography; Order Finding Problem; Quantum Order Computing; Quantum Integer Factorization; Quantum Algorithm for Breaking RSA; Exercises and Problems for Sect. 5.3; 5.4 Conclusions, Notes and Further Reading; References; 6 Logarithm Based Cryptography; 6.1 Discrete Logarithm Problem; Problems for Sect. 6.1; 6.2 Classic Solutions to Discrete Logarithm Problem; Shanks' Baby-Step Giant-Step Algorithm 
520 |a This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively. Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9 
588 0 |a Online resource; title from digital title page (viewed on February 14, 2019) 
650 0 |a Cryptography 
650 0 |a Data encryption (Computer science) 
650 7 |a Cryptography  |2 fast 
650 7 |a Data encryption (Computer science)  |2 fast 
655 4 |a Electronic books 
776 0 8 |i Print version:  |a Yan, Song Y  |t Cybercryptography: Applicable Cryptography for Cyberspace Security.  |d Cham : Springer, ©2018  |z 9783319725345 
999 1 0 |i b190bb34-b90d-4a12-b98e-c28d66033da4  |l 11761358  |s US-ICU  |m cybercryptographyapplicable_cryptography_for_cyberspace_security___________2019_______sprina________________________________________yan__song_y________________________e