Published: October 2015 Pages: 608
Cryptography underpins today's cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.
The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture-full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise-the reader will be exposed to only the formulas and equations needed to master the art of cryptography.
Concisely explains complex formulas and equations and makes the math easy
Teaches even the information security novice critical encryption skills
Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world
Chuck Easttom has taught cryptography for federal agencies and friendly foreign governments and has worked on cryptography projects for Department of Defense contractors. He is the author of many security-focused books, including CCFP Certified Cyber Forensics Professional All-in-One Exam Guide.
Keywords: MODERN CRYPTOGRAPHY: APPLIED MATHEMATICS FOR ENCRYPTION AND INFORMATION SECURITY, MODERN CRYPTOGRAPHY, CRYPTOGRAPHY, APPLIED MATHEMATICS, ENCRYPTION, INFORMATION SECURITY, CHUCK EASTTOM, CHARLES EASTTOM, WILLIAM EASTTOM, CYBERSECURITY, INFORMATION SECURITY, SECURITY, IT SECURITY, MATHEMATICS, CRYPTOGRAPHICALLY-SECURE, CRYPTOGRAPHERS, CRYPTOGRAPHY, CRYPTOGRAPHIC HASHES, CRYPTANALYSIS, STEGANOGRAPHY, ESSENTIAL NUMBER THEORY, DISCRETE MATH, ESSENTIAL ALGEBRA, SYMMETRIC CIPHERS, CIPHERS, HASHES, FEISTEL NETWORKS, SUBSTITUTION-PERMUTATION NETWORKS, S-BOX DESIGN, HASHING, ASYMMETRIC CIPHERS, COMMON ALGORITHMS, ECC, RANDOM NUMBER GENERATORS, SSL/TLS, VPNS, STEGANOGRAPHY, CRYPTANALYSIS, CRYPTOGRAPHIC BACKDOORS