Library Logo

Public key cryptography : applications and attacks / (Record no. 206516)

000 -LEADER
fixed length control field 06358cam a2200757Ma 4500
001 - CONTROL NUMBER
control field ocn828735989
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20171107092303.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cn||||||||a
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 120820s2013 njuad ob 001 0 eng d
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 016182125
Source Uk
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118482315
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 111848231X
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781118482261
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1118482263
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781283960526
Qualifying information (MyiLibrary)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1283960524
Qualifying information (MyiLibrary)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781118317129
Qualifying information (cloth)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1118317122
024 3# - OTHER STANDARD IDENTIFIER
Standard number or code 9781118482261
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000050824139
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 010026750
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 306234947
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV041906334
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBBG
System control number BV043395533
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 400042762
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 431299145
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 449341380
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NLGGC
System control number 35670405X
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier NZ1
System control number 15340409
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)828735989
Canceled/invalid control number (OCoLC)824697371
-- (OCoLC)827623334
-- (OCoLC)960200499
-- (OCoLC)961570920
-- (OCoLC)962709374
040 ## - CATALOGING SOURCE
Original cataloging agency E7B
Language of cataloging eng
Description conventions pn
Transcribing agency E7B
Modifying agency OCLCO
-- OCLCQ
-- YDXCP
-- DG1
-- UKMGB
-- IEEEE
-- NOC
-- OCLCO
-- OCLCF
-- N$T
-- CDX
-- COO
-- IDEBK
-- EBLCP
-- UKDOC
-- DEBSZ
-- OCLCQ
-- LOA
-- OCLCQ
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number TK5102.94
Item number .B38 2013eb
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM
Subject category code subdivision 083000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Batten, Lynn Margaret.
245 10 - TITLE STATEMENT
Title Public key cryptography : applications and attacks /
Statement of responsibility, etc. Lynn Margaret Batten.
Medium [electronic resource]
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc. Hoboken, N.J. :
Name of publisher, distributor, etc. John Wiley & Sons,
Date of publication, distribution, etc. ©2013.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (xvii, 201 pages) :
Other physical details illustrations.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement IEEE Press series on information and communication networks security
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples.
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test.
520 ## - SUMMARY, ETC.
Summary, etc. This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision History.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key cryptography.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element COMPUTERS
General subdivision Security
-- Cryptography.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Cryptography
General subdivision Mathematics.
Source of heading or term fast
Authority record control number (OCoLC)fst00884558
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Public key cryptography.
Source of heading or term fast
Authority record control number (OCoLC)fst01082562
655 #4 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
Main entry heading Batten, Lynn Margaret.
Title Public key cryptography.
Place, publisher, and date of publication Hoboken, N.J. : John Wiley & Sons, ©2013
Record control number (DLC) 2012025411
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title IEEE Press series on information & communication networks security.
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier http://onlinelibrary.wiley.com/book/10.1002/9781118482261
Public note Wiley Online Library
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type Books

No items available.

Last Updated on September 15, 2019
© Dhaka University Library. All Rights Reserved|Staff Login