توضیحاتی در مورد کتاب Cryptography and Cryptanalysis in MATLAB: Creating and Programming Advanced Algorithms
نام کتاب : Cryptography and Cryptanalysis in MATLAB: Creating and Programming Advanced Algorithms
ویرایش : 1 ed.
عنوان ترجمه شده به فارسی : رمزنگاری و تحلیل رمز در متلب: ایجاد و برنامه نویسی الگوریتم های پیشرفته
سری :
نویسندگان : Marius Iulian Mihailescu, Stefania Loredana Nita
ناشر : Apress
سال نشر : 2021
تعداد صفحات : 207
ISBN (شابک) : 1484273338 , 9781484273333
زبان کتاب : English
فرمت کتاب : epub درصورت درخواست کاربر به PDF تبدیل می شود
حجم کتاب : 5 Mb
بعد از تکمیل فرایند پرداخت لینک دانلود کتاب ارائه خواهد شد. درصورت ثبت نام و ورود به حساب کاربری خود قادر خواهید بود لیست کتاب های خریداری شده را مشاهده فرمایید.
توضیحاتی در مورد کتاب :
به اصول رمزنگاری و تحلیل رمز تسلط داشته باشید و یاد بگیرید که چگونه از آنها استفاده عملی کنید. هر فصل از این کتاب با مقدمهای بر مفاهیمی که الگوریتمهای رمزنگاری بر اساس آنها هستند و نحوه استفاده از آنها در عمل آغاز میشود و نمونههایی کاملاً کاربردی برای هر یک از الگوریتمهای ارائهشده ارائه میکند. بخشهای پیادهسازی شما را در کل فرآیند نوشتن برنامهها و برنامههای خود با استفاده از MATLAB راهنمایی میکند.
Cryptography و Cryptanalysis در MATLAB بهعنوان مرجع قطعی رمزنگاری شما عمل خواهد کرد. شما یک دانشآموز، توسعهدهنده حرفهای یا محقق هستید و نشان میدهید که چگونه میتوان با استفاده از ابزارهای قدرتمند MATLAB بر بسیاری از چالشهای رمزنگاری غلبه کرد.
آنچه خواهید آموخت
فهرست مطالب :
Table of Contents
About the Authors
About the Technical Reviewer
Chapter 1: Getting Started in Cryptography and Cryptanalysis
Cryptography and Cryptanalysis
Book Structure
Conclusion
References
Chapter 2: MATLAB Cryptography Functions
Conclusion
References
Chapter 3: Conversions Used in MATLAB for Cryptography
Conclusion
References
Chapter 4: Basic Arithmetic Foundations
Euclid’s Division Lemma
Greatest Common Divisor (gcd)
Euclid’s Algorithm
The Extended Euclidean Algorithm
Practical Implementations
The Extended Euclidean Algorithm
Prime Factors in MATLAB
Computing the Modular Inverse
Conclusion
References
Chapter 5: Number Theory
Primality and Factorization
Prime Numbers
The Prime Number Theorem
Congruency
Inverse
Chinese Remainder Theorem
Primality Tests
The Wilson Primality Test
The Little Fermat Primality Test
The Miller-Rabin Primality Test
Algebraic Structures
Conclusion
References
Chapter 6: Classic Cryptography
Symmetric Cryptography
Classic Ciphers
The Caesar Cipher
Example
Mathematical Background
Cryptanalysis
Implementing the Caesar Cipher
The Vigenère Cipher
Example
Mathematical Background
Implementing the Vigenère Cipher
The Hill Cipher
Example
Cryptanalysis
Implementing the Hill Cipher
Conclusion
References
Chapter 7: Pseudo-Random Number Generators
Simple PRNGs
Linear Congruential Generators
Ranrot Generators
Blum-Blum-Shub Generator
Linear Circuit PRNGs
Other PRNGs
Practical Implementations
Conclusion
References
Chapter 8: Hash Functions
Security of Hash Functions
Cryptographic Hash Functions
Birthday Attack
MD4 Function
MD4 Function Description
Cryptanalysis of MD4
MD5 Function
SHA1 Function
Implementing Hash Functions
Implementing SHA-1/256/368/512, MD2, and MD5
Conclusion
References
Chapter 9: Block Ciphers: DES and AES
Preliminaries
Networks Based on Substitution and Permutation
Attacks Based on Linear Cryptanalysis
Attacks Based on Differential Cryptanalysis
The Data Encryption Standard (DES)
DES Description
Implementation of DES
The Advanced Encryption System (AES)
SubBytes Operations
The ShiftRows Operation
The MixColumn Operation
The AddRoundKey Operation
Key Expansion
InvSubBytes Operation
InvShiftRows Operation
InvMixColumns Operation
Conclusion
References
Chapter 10: Asymmetric Encryption Schemes
RSA
ElGamal
Merkle-Hellman
Knapsack Approach
The Algorithms
Conclusion
References
Chapter 11: Formal Techniques for Cryptography
Probability Theory
Random Variables
Birthday Problem
Entropy
Randomness in Cryptography
Conclusion
References
Chapter 12: Visual Cryptography
Conclusion
References
Chapter 13: Chaos-Based Cryptography
Chaos Maps and Functions
Logistic Map
Chaos Theory in Cryptography
Sensitivity to Initial Conditions
Conclusion
References
Chapter 14: Steganography
Algorithms and Methods for Different Steganography Types
Steganography for Image Files
Steganography for Audio Files
Steganography for Video Files
Practical Implementation
Implementing the Least Significant Bit (LSB) Method
Implementing the Histogram Analysis Method
Conclusion
References
Index
توضیحاتی در مورد کتاب به زبان اصلی :
Master the essentials of cryptography and cryptanalysis and learn how to put them to practical use. Each chapter of this book starts with an introduction to the concepts on which cryptographic algorithms are based and how they are used in practice, providing fully working examples for each of the algorithms presented. Implementation sections will guide you through the entire process of writing your own applications and programs using MATLAB.
Cryptography and Cryptanalysis in MATLAB will serve as your definitive go-to cryptography reference, whether you are a student, professional developer, or researcher, showing how a multitude of cryptographic challenges can be overcome using the powerful tools of MATLAB.
What You Will Learn
- Discover MATLAB’s cryptography functions
- Work with conversion mechanisms in MATLAB
Implement cryptographic algorithms using arithmetic operations - Understand the classical, simple cryptosystems that form the basis of modern cryptography
- Develop fully working solutions (encryption/decryption operations)
- Study pseudo-random generators and their real-life implementations
- Utilize hash functions by way of practical examples
- Implement solutions to defend against practical cryptanalysis methods and attacks
- Understand asymmetric and symmetric encryption systems and how to use them
Leverage visual cryptography, steganography, and chaos-based cryptography
Who This Book Is For
Those who are new to cryptography/analysis. Some prior exposure to MATLAB recommended.