Der Artikel wird am Ende des Bestellprozesses zum Download zur Verfügung gestellt.

Mechanics of 3G Cryptography

 EPUB
Nicht lieferbar | Lieferzeit: Artikel nicht lieferbar I
eBook Typ:
Adobe Digital Editions
eBook Format:
EPUB
Kopierschutz:
Adobe DRM [Hard-DRM]
Beschreibung:

There is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the precise workings of 3G cryptography then this book is for you; it is perhaps the only book of its kind. Every single original algorithm of 3G User Equipment (3G mobile phones) is explained in explicit detail, and each is coupled with a thorough example. The algorithms include the standardised functions, UEA1 for confidentiality and UIA1 for integrity, along with Kasumi, the corresponding kernel algorithm, and also all the non-standardised algorithms for authentication and key agreement, along with their corresponding kernel algorithm, Rijndael (A.E.S.). Contained here is all the information required to literally pencil-and-paper all the cryptographic inputs to outputs of 3G mobiles
There is a plethora of books available on 3G mobile technology in its entirety, but when it comes to the actual mechanics of the cryptographic algorithms involved the information is typically vague. If your interest is in the precise workings of 3G cryptography then this book is for you; it is perhaps the only book of its kind. Every single original algorithm of 3G User Equipment (3G mobile phones) is explained in explicit detail, and each is coupled with a thorough example. The algorithms include the standardised functions, UEA1 for confidentiality and UIA1 for integrity, along with Kasumi, the corresponding kernel algorithm, and also all the non-standardised algorithms for authentication and key agreement, along with their corresponding kernel algorithm, Rijndael (A.E.S.). Contained here is all the information required to literally pencil-and-paper all the cryptographic inputs to outputs of 3G mobiles

Kunden Rezensionen

Zu diesem Artikel ist noch keine Rezension vorhanden.
Helfen sie anderen Besuchern und verfassen Sie selbst eine Rezension.