If you are looking for a book that rigorously pursues cryptology from a mathematical perspective AND programming, look no further! This book has a lot of mathematics in it, complete with proofs of most claims, and there is a lot of code to review from the book’s companion code repository.
The book covers secret-key and public-key encryption/decryption for many different ciphers, and explores the various weaknesses of these cryptosystems and cryptanalytic attacks on them.
We also look at the larger realm of information theory and what generally makes cryptosystems vulnerable.
The book also covers compression briefly near the end, because in addition to making messages smaller, compression can aid in confounding cryptanalysis attempts as well.
The book covers secret-key and public-key encryption/decryption for many different ciphers, and explores the various weaknesses of these cryptosystems and cryptanalytic attacks on them.
We also look at the larger realm of information theory and what generally makes cryptosystems vulnerable.
The book also covers compression briefly near the end, because in addition to making messages smaller, compression can aid in confounding cryptanalysis attempts as well.