AHA-BUCH

Cryptography in C and C++
-14 %
Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Cryptography in C and C++

 Ebook
Sofort lieferbar | Lieferzeit:3-5 Tage I

Unser bisheriger Preis:ORGPRICE: 78,95 €

Jetzt 67,82 €*

ISBN-13:
9781430200260
Einband:
Ebook
Seiten:
504
Autor:
Michael Welschenbach
eBook Typ:
PDF
eBook Format:
PDF
Kopierschutz:
1 - PDF Watermark
Sprache:
Englisch
Beschreibung:

"This book covers all that is needed to write professional-level cryptographic code. An expanded and improved version of the very well received first edition, it includes approximately 100 pages of new material as well as numerous improvements in the original text. TOC:Part I: Arithmetic and Number Theory in C: Introduction. Number Format-The Representation of Large Integers in C. Interface Semantics. Basic Calculations. Modular Arithmetic - Calculating with Residue Classes. Where Everything Comes Together: Modular Exponentiation.- Bitwise and Logical Functions. Input, Output, Assignment, Conversion.- Dynamic Registers. Number-Theoretic Functions. Large Random Numbers. Tests.- Part II: Arithmetic in C++ with the Class LINT: Classes: With C++ Everything Is Easier. The LINT Public Interface: Members and Friends. Error Handling. An Application Example: The RSA Cryptosystem. Do It Yourself: Test LINT. Approaches to Further Development. Afterword.- Appendices: Appendix A: Rijndael : A successor to DES. Appendix B: List of C Functions. Appendix C: List of C++ Functions. Appendix D: Macros. Appendix E: Calculation Times. Appendix F: Notation. Appendix G: Arithmetic and Number-Theoretic Software Packages. Appendix H: List of Figures and Tables. Index."
"Part I: Arithmetic and Number Theory in C: Introduction. Number Format-The Representation of Large Integers in C. Interface Semantics. Basic Calculations. Modular Arithmetic - Calculating with Residue Classes. Where Everything Comes Together: Modular Exponentiation.- Bitwise and Logical Functions. Input, Output, Assignment, Conversion.- Dynamic Registers. Number-Theoretic Functions. Large Random Numbers. Tests.- Part II: Arithmetic in C++ with the Class LINT: Classes: With C++ Everything Is Easier. The LINT Public Interface: Members and Friends. Error Handling. An Application Example: The RSA Cryptosystem. Do It Yourself: Test LINT. Approaches to Further Development. Afterword.- Appendices: Appendix A: Rijndael : A successor to DES. Appendix B: List of C Functions. Appendix C: List of C++ Functions. Appendix D: Macros. Appendix E: Calculation Times. Appendix F: Notation. Appendix G: Arithmetic and Number-Theoretic Software Packages. Appendix H: List of Figures and Tables. Index."
CRYPTOGRAPHY IS AN ANCIENT ART, well over two thousand years old. The need to keep certain information secret has always existed, and attempts to preserve secrets have therefore existed as well. But it is only in the last thirty years that cryptography has developed into a science that has offered us needed security in our daily lives. Whether we are talking about automated teller machines, cellular telephones, Internet commerce, or computerized ignition locks on automobiles, there is cryptography hidden within. And what is more, none of these applications would work without cryptography! The historyofcryptographyoverthepastthirtyyearsisauniquesuccessstory. The most important event was surely the discovery of public key cryptography in the mid 1970s. It was truly a revolution: We know today that things are possible that previously we hadn"t even dared to think about. Dif?e and Hellman were the ?rst to formulate publicly the vision that secure communication must be able to take place spontaneously. Earlier, it was the case that sender and receiver had ?rst to engage in secret communication to establish a common key. Dif?e and Hellman asked, with the naivety of youth, whether one could communicate secretly without sharing a common secret. Their idea was that one could encrypt information without a secret key, that is, one that no one else could know. This idea signaled the birth of public key cryptography. That this vision was more than just wild surmise was shown a few years later with the advent of the RSA algorithm.

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.