One of the core technologies that protects cyberspace, cryptology is also intellectually stimulating and fun. This is the only book available that combines classical and contemporary methods of cryptology with a historical perspective. Encourages readers to explore their strengths and weaknesses as they experiment with various ciphers. Features seamless integration between the book's material and accompanying software package (CAP), which enables readers to experiment with the concepts discussed. Covers the practical use of ...
Read More
One of the core technologies that protects cyberspace, cryptology is also intellectually stimulating and fun. This is the only book available that combines classical and contemporary methods of cryptology with a historical perspective. Encourages readers to explore their strengths and weaknesses as they experiment with various ciphers. Features seamless integration between the book's material and accompanying software package (CAP), which enables readers to experiment with the concepts discussed. Covers the practical use of a stream cipher. Uses Block Ciphers in a network, presenting another case where readers are introduced to the actual use of a cipher system. Offers charts at the end of each chapter that show how the new ciphers covered in that chapter fit into the entire classification scheme of cipher systems, helping readers understand the interrelationships which exist between ciphers. A useful and interesting reference for network security professionals.
Read Less