Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Modern cryptographyModern cryptography

Modern cryptography

Chuck Easttom

About this book

A Practical Guide to Cryptography Principles and Security Practices Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today’s data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications. Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors. Learn the necessary number theory, discrete math, and algebra Employ symmetric ciphers, including Feistel and substitution-permutation ciphers Understand asymmetric cryptography algorithms Design s-boxes that maximize output non-linearity Deploy cryptographic hashes Create cryptographic keys using pseudo random number generators Encrypt Web traffic using SSL/TLS Secure VPN, WiFi, and SSH communications Work with cryptanalysis and steganography Explore government, military, and intelligence agency applications

Details

OL Work ID
OL20028527W

Subjects

Data encryption (Computer science)Computer securityMathematicsComputer networksSecurity measuresInformation networksCryptographyKryptologie

Find this book

HardcoverOpen Library
Book data from Open Library. Cover images courtesy of Open Library.