You are here

Cryptology: Classical and Modern

Richard Klima and Neil Sigmon
Publisher: 
Chapman & Hall/CRC
Publication Date: 
2018
Number of Pages: 
482
Format: 
Hardcover
Edition: 
2
Series: 
Chapman & Hall/CRC Cryptography and Network Security
Price: 
119.95
ISBN: 
9781138047624
Category: 
Textbook
[Reviewed by
Fernando Q. Gouvêa
, on
12/18/2018
]

See Mark Hunacek’s review of the first edition. The authors tell us that the first edition was based on a course taught to students in non-technical fields and worked well for that audience. On the other hand,

… when we tried offering the course to students from more technical fields, we found it necessary to supplement the material in the first edition. The second edition of this book is an expanded version of the first edition that, while keeping all of the material that fully served students from nontechnical fields, supplements this material with new content that we believe now allows the book to fully serve students from more technical fields as well.

The “maplets” mentioned in the title of the first edition, together with the original detailed instructions on how to use this and other technologies, remain available but have now moved online, allowing students and instructors freedom to use other tools if they prefer.


Fernando Q. Gouvêa is the editor of MAA Reviews.

1. Introduction to Cryptology

Basic Terminology

Cryptology in Practice

Why Study Cryptology?

2. Substitution Ciphers

Keyword Substitution Ciphers

Cryptanalysis of Substitution Cipher

Playfair Ciphers

The Navajo Code

3. Transposition Ciphers

Columnar Transposition Ciphers

Cryptanalysis of Transposition Ciphers

ADFGX and ADFGVX Ciphers

4. The Enigma Machine

The Enigma Cipher Machine

Combinatorics

Security of the Enigma Machine

5. The Turing Bombe

Cribs and Menus

Loops and Logical Inconsistencies

Searching for the Correct Configuration

The Diagonal Board

The Checking Machine

Turnovers

Clonking

Final Observations

6. Shift and Affine Ciphers

Modular Arithmetic

Shift Ciphers

Cryptanalysis of Shift Ciphers

Affine Ciphers

Cryptanalysis of Affine Ciphers

7. Alberti and Vigenère Ciphers

Alberti Ciphers

Vigenère Ciphers

Probability

The Friedman Test

The Kasiski Test

Cryptanalysis of Vigenère Keyword Ciphers

8. Hill Ciphers

Matrices

Hill Ciphers

Cryptanalysis of Hill Ciphers

9. RSA Ciphers

Introduction to Public-Key Ciphers

Introduction to RSA Ciphers

The Euclidean Algorithm

Modular Exponentiation

ASCII

RSA Ciphers

Cryptanalysis of RSA Ciphers

Primality Testing

Integer Factorization

The RSA Factoring Challenges

10. ElGamal Ciphers

The Diffie-Hellman Key Exchange

Discrete Logarithms

ElGamal Ciphers

Cryptanalysis of ElGamal Ciphers

11. The Advanced Encryption Standard

Representations of Numbers

Stream Ciphers

AES Preliminaries

AES Encryption

AES Decryption

AES Security

12. Message Authentication

RSA Signatures

Hash Functions

RSA Signatures with Hashing

The Man-in-the-Middle Attack

Public-Key Infrastructures

Bibliography

Hints and Answers for Selected Exercises

Index

Dummy View - NOT TO BE DELETED