This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key encryption, hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, and many others. The section on intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed. The final chapters introduce modern e- business systems based on digital cash.The sender computes the cryptogram c = e Am m mod N which for the assumed values is the point c = (79227, 19622). ... implemented using any system for algebraic computations, such as MAPLE, MATHEMATICA, or MAGMA, that supports multiprecision arithmetic. ... To load it into MAPLE, type: # reada#39;alt; namefileagt;a#39;; # where alt;namefileagt; is a file with the code in the same directory # MAPLE software is run.
|Title||:||Fundamentals of Computer Security|
|Author||:||Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry|
|Publisher||:||Springer Science & Business Media - 2013-03-09|