Cryptology: Classical and Modern with Maplets

1st Edition

Richard E. Klima, Neil P. Sigmon

Chapman and Hall/CRC
Published June 20, 2012
Textbook - 548 Pages - 163 B/W Illustrations
ISBN 9781439872413 - CAT# K13332
Series: Chapman & Hall/CRC Cryptography and Network Security Series

For Instructors Request Inspection Copy

was $94.95

USD$75.96

SAVE ~$18.99

Add to Wish List
FREE Standard Shipping!

Summary

Easily Accessible to Students with Nontechnical Backgrounds
In a clear, nontechnical manner, Cryptology: Classical and Modern with Maplets explains how fundamental mathematical concepts are the bases of cryptographic algorithms. Designed for students with no background in college-level mathematics, the book assumes minimal mathematical prerequisites and incorporates student-friendly Maplets throughout that provide practical examples of the techniques used.

Technology Resource
By using the Maplets, students can complete complicated tasks with relative ease. They can encrypt, decrypt, and cryptanalyze messages without the burden of understanding programming or computer syntax. The authors explain topics in detail first before introducing one or more Maplets. All Maplet material and exercises are given in separate, clearly labeled sections. Instructors can omit the Maplet sections without any loss of continuity and non-Maplet examples and exercises can be completed with, at most, a simple hand-held calculator. The Maplets are available for download at www.radford.edu/~npsigmon/cryptobook.html.

A Gentle, Hands-On Introduction to Cryptology
After introducing elementary methods and techniques, the text fully develops the Enigma cipher machine and Navajo code used during World War II, both of which are rarely found in cryptology textbooks. The authors then demonstrate mathematics in cryptology through monoalphabetic, polyalphabetic, and block ciphers. With a focus on public-key cryptography, the book describes RSA ciphers, the Diffie–Hellman key exchange, and ElGamal ciphers. It also explores current U.S. federal cryptographic standards, such as the AES, and explains how to authenticate messages via digital signatures, hash functions, and certificates.

Instructors

We provide complimentary e-inspection copies of primary textbooks to instructors considering our books for course adoption.

Request an
e-inspection copy

Share this Title