A Cryptography Primer

Secrets and Promises

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, General Computing
Cover of the book A Cryptography Primer by Philip N. Klein, Cambridge University Press
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Philip N. Klein ISBN: 9781139904421
Publisher: Cambridge University Press Publication: March 17, 2014
Imprint: Cambridge University Press Language: English
Author: Philip N. Klein
ISBN: 9781139904421
Publisher: Cambridge University Press
Publication: March 17, 2014
Imprint: Cambridge University Press
Language: English

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.

More books from Cambridge University Press

Cover of the book Practical Management of Bipolar Disorder by Philip N. Klein
Cover of the book State Formations by Philip N. Klein
Cover of the book Plato's Account of Falsehood by Philip N. Klein
Cover of the book Rejecting Rights by Philip N. Klein
Cover of the book Western Intervention in the Balkans by Philip N. Klein
Cover of the book The People's Game by Philip N. Klein
Cover of the book Law and Creativity in the Age of the Entertainment Franchise by Philip N. Klein
Cover of the book Going Beyond Aid by Philip N. Klein
Cover of the book Rival Reputations by Philip N. Klein
Cover of the book Operating Room Leadership and Management by Philip N. Klein
Cover of the book The Ecology of War in China by Philip N. Klein
Cover of the book Appalachian Set Theory by Philip N. Klein
Cover of the book The City in the Classical and Post-Classical World by Philip N. Klein
Cover of the book The Pediatric and Perinatal Autopsy Manual by Philip N. Klein
Cover of the book Emperors and Bishops in Late Roman Invective by Philip N. Klein
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy