Public Key Cryptography: Applications and Attacks Front Cover

Public Key Cryptography: Applications and Attacks

  • Length: 224 pages
  • Edition: 1
  • Publisher:
  • Publication Date: 2013-01-22
  • ISBN-10: 1118317122
  • ISBN-13: 9781118317129
  • Sales Rank: #3266582 (See Top 100 Books)
Description

Public Key Cryptography: Applications and Attacks (IEEE Press Series on Information and Communication Networks Security)
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Security Professional).

Table of Contents

0 Introduction 1
1 Congruence Equations 13
2 The ElGamal Scheme 49
3 The RSA Scheme 67
4 Elliptic Curve Cryptography 93
5 Digital Signatures 117
6 Primality Testing 155
7 Factoring Methods 179

To access the link, solve the captcha.