Public key cryptography : applications and attacks / (Record no. 206516)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06358cam a2200757Ma 4500 |
001 - CONTROL NUMBER | |
control field | ocn828735989 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20171107092303.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cn||||||||a |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 120820s2013 njuad ob 001 0 eng d |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 016182125 |
Source | Uk |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118482315 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 111848231X |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781118482261 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1118482263 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781283960526 |
Qualifying information | (MyiLibrary) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1283960524 |
Qualifying information | (MyiLibrary) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781118317129 |
Qualifying information | (cloth) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1118317122 |
024 3# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 9781118482261 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000050824139 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 010026750 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 306234947 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV041906334 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBBG |
System control number | BV043395533 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 400042762 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 431299145 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 449341380 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NLGGC |
System control number | 35670405X |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | NZ1 |
System control number | 15340409 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)828735989 |
Canceled/invalid control number | (OCoLC)824697371 |
-- | (OCoLC)827623334 |
-- | (OCoLC)960200499 |
-- | (OCoLC)961570920 |
-- | (OCoLC)962709374 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | E7B |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | E7B |
Modifying agency | OCLCO |
-- | OCLCQ |
-- | YDXCP |
-- | DG1 |
-- | UKMGB |
-- | IEEEE |
-- | NOC |
-- | OCLCO |
-- | OCLCF |
-- | N$T |
-- | CDX |
-- | COO |
-- | IDEBK |
-- | EBLCP |
-- | UKDOC |
-- | DEBSZ |
-- | OCLCQ |
-- | LOA |
-- | OCLCQ |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | TK5102.94 |
Item number | .B38 2013eb |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM |
Subject category code subdivision | 083000 |
Source | bisacsh |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8/2 |
Edition number | 23 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Batten, Lynn Margaret. |
245 10 - TITLE STATEMENT | |
Title | Public key cryptography : applications and attacks / |
Statement of responsibility, etc. | Lynn Margaret Batten. |
Medium | [electronic resource] |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) | |
Place of publication, distribution, etc. | Hoboken, N.J. : |
Name of publisher, distributor, etc. | John Wiley & Sons, |
Date of publication, distribution, etc. | ©2013. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (xvii, 201 pages) : |
Other physical details | illustrations. |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | IEEE Press series on information and communication networks security |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc | Includes bibliographical references and index. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Public key cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | Mathematics. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | History. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | Mathematics. |
650 #4 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Public key cryptography. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | COMPUTERS |
General subdivision | Security |
-- | Cryptography. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography |
General subdivision | Mathematics. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst00884558 |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Public key cryptography. |
Source of heading or term | fast |
Authority record control number | (OCoLC)fst01082562 |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Batten, Lynn Margaret. |
Title | Public key cryptography. |
Place, publisher, and date of publication | Hoboken, N.J. : John Wiley & Sons, ©2013 |
Record control number | (DLC) 2012025411 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | IEEE Press series on information & communication networks security. |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | http://onlinelibrary.wiley.com/book/10.1002/9781118482261 |
Public note | Wiley Online Library |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | |
Koha item type | Books |
No items available.