Public Key Cryptography - Applications and Attacks (Electronic book text, 1st edition)


Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them "Public Key Cryptography: Applications and Attacks" introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based - such as the discrete logarithm problem and the difficulty of factoring integers.The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. "Public Key Cryptography: "- Explains fundamentals of public key cryptography- Offers numerous examples and exercises- Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam- Provides solutions to the end-of-chapter problems

"Public Key Cryptography" provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.


Delivery AdviceNot available

Toggle WishListAdd to wish list
Review this Item

Product Description

Complete coverage of the current major public key cryptosystems their underlying mathematics and the most common techniques used in attacking them "Public Key Cryptography: Applications and Attacks" introduces and explains the fundamentals of public key cryptography and explores its application in all major public key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It provides the underlying mathematics needed to build and study these schemes as needed, and examines attacks on said schemes via the mathematical problems on which they are based - such as the discrete logarithm problem and the difficulty of factoring integers.The book contains approximately ten examples with detailed solutions, while each chapter includes forty to fifty problems with full solutions for odd-numbered problems provided in the Appendix. "Public Key Cryptography: "- Explains fundamentals of public key cryptography- Offers numerous examples and exercises- Provides excellent study tools for those preparing to take the Certified Information Systems Security Professional (CISSP) exam- Provides solutions to the end-of-chapter problems

"Public Key Cryptography" provides a solid background for anyone who is employed by or seeking employment with a government organization, cloud service provider, or any large enterprise that uses public key systems to secure data.

Customer Reviews

No reviews or ratings yet - be the first to create one!

Product Details

General

Imprint

Wiley-IEEE Press

Country of origin

United States

Series

IEEE Press Series on Information and Communication Networks Security, 16

Release date

2013

Availability

We don't currently have any sources for this product. If you add this item to your wish list we will let you know when it becomes available.

First published

2013

Authors

Format

Electronic book text

Pages

224

Edition

1st edition

ISBN-13

978-1-118-48227-8

Barcode

9781118482278

Categories

LSN

1-118-48227-1



Trending On Loot