close
1.

図書

図書
R.F. Churchhouse
出版情報: Cambridge : Cambridge University Press, 2002  x, 240 p. ; 24 cm
所蔵情報: loading…
目次情報: 続きを見る
Preface
Introduction / 1:
Some aspects of secure communication
Julius Caesar's cipher
Some basic definitions
Three stages to decrytion: identification, breaking and setting
Codes and ciphers
Assessing the strength of a cipher system
Error detecting and correcting codes
Other methods of concealing messages
Modular arithmetic
Modular addition and subtraction of letters
Gender
End matter
From Julius Caesar to simple substitution / 2:
Julius Caesar ciphers and their solution
Simple substitution ciphers
How to solve a simple substitution cipher
Letter frequencies in languages other than English
How many letters are needed to solve a simple substitution cipher?
Polyalphabetic systems / 3:
Strengthening Julius Caesar: Vigenere ciphers
How to solve a Vigenere cipher
Indicators
Depths
Recognising 'depths'
How much text do we need to solve a Vigenere cipher?
Jefferson's cylinder
Jigsaw ciphers / 4:
Transpositions
Simple transposition
Double transposition
Other forms of transposition
Assessment of the security of transposition ciphers
Double encipherment in general
Two-letter ciphers / 5:
Monograph to digraph
MDTM ciphers
Digraph to digraph
Playfair encipherment
Playfair decipherment
Cryptanalytic aspects of Playfair
Double Playfair
Codes / 6:
Characteristics of codes
One-part and two-part codes
Code plus additive
Ciphers for spies / 7:
Stencil ciphers
Book ciphers
Letter frequencies in book ciphers
Solving a book cipher
Disastrous errors in using a book cipher
'Garbo"s ciphers
One-time pad
Producing random numbers and letters / 8:
Random sequences
Producing random sequences
Coin spinning
Throwing dice
Lottery type draws
Cosmic rays
Amplifier noise
Pseudo-random sequences
Linear recurrences
Using a binary stream of key for encipherment
Binary linear sequences as key generators
Cryptanalysis of a linear recurrence
Improving the security of binary keys
Pseudo-random number generators
The mid-square method
Linear congruential generators
The Enigma cipher machine / 9:
Historical background
The original Enigma
Encipherment using wired wheels
Encipherment by the Enigma
The Enigma plugboard
The Achilles heel of the Enigma
The indicator 'chains' in the Enigma
Aligning the chains
Identifying R1 and its setting
Doubly enciphered Enigma messages
The Abwehr Enigma
The Hagelin cipher machine / 10:
Structure of the Hagelin machine
Encipherment on the Hagelin
Choosing the cage for the Hagelin
The theoretical 'work factor' for the Hagelin
Solving the Hagelin from a stretch of key
Additional features of the Hagelin machine
The slide
Identifying the slide in a cipher message
Overlapping
Solving the Hagelin from cipher texts only
Beyond the Enigma / 11:
The SZ42: a pre-electronic machine
Description of the SZ42 machine
Encipherment on the SZ42
Breaking and setting the SZ42
Modifications to the SZ42
Public key cryptography / 12:
Security issues
Protection of programs and data
Encipherment of programs, data and messages
The key distribution problem
The Diffie-Hellman key exchange system
Strength of the Diffie-Hellman system
Encipherment and the internet / 13:
Generalisation of simple substitution
Factorisation of large integers
The standard method of factorisation
Fermat's 'Little Theorem'
The Fermat-Euler Theorem (as needed in the RSA system)
Encipherment and decipherment keys in the RSA system
The encipherment and decipherment processes in the RSA system
How does the key-owner reply to correspondents?
The Data Encryption Standard (DES)
Security of the DES
Chaining
Implementation of the DES
Using both RSA and DES
A salutary note
Beyond the DES
Authentication and signature verification
Elliptic curve cryptography
Appendix
Solutions to problems
References
Name index
Subject index
Preface
Introduction / 1:
Some aspects of secure communication
2.

図書

図書
G.J.チャイティン著 ; 黒川利明訳
出版情報: 府中 : エスアイビー・アクセス , 東京 : 星雲社 (発売), 2001.6  158p ; 20cm
所蔵情報: loading…
3.

図書

図書
J.A.ブーフマン著 ; 林芳樹訳
出版情報: 東京 : シュプリンガー・フェアラーク東京, 2001.7  x, 309p ; 21cm
所蔵情報: loading…
4.

図書

図書
edited by Pedro Larrañaga, Jose A. Lozano
出版情報: Boston, Mass. : Kluwer Academic Publishers, c2002  xxxi, 382 p. ; 25 cm
シリーズ名: Genetic algorithms and evolutionary computation ; 2
所蔵情報: loading…
5.

図書

図書
Juraj Hromkovic̆
出版情報: Berlin : Springer, c2001  xi, 492 p. ; 24 cm
シリーズ名: Texts in theoretical computer science ; An EATCS series
所蔵情報: loading…
6.

図書

図書
by Stefan Katzenbeisser
出版情報: Boston, MA : Kluwer Academic, c2001  xiii, 140 p. ; 24-25 cm
シリーズ名: Advances in information security
所蔵情報: loading…
7.

図書

図書
Jiming Liu
出版情報: Singapole : World Scientific, c2001  xx, 280 p. ; 23 cm
所蔵情報: loading…
8.

図書

図書
横尾英俊著
出版情報: 東京 : 共立出版, 2004.9  vi, 174p ; 21cm
所蔵情報: loading…
9.

図書

図書
鈴木昇一著
出版情報: 東京 : 創成社, 2011.10  xiii, 204p ; 26cm
所蔵情報: loading…
10.

図書

図書
鈴木昇一著
出版情報: 東京 : 創成社, 2011.11  xvii, 284p ; 26cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼