Cryptanalysis of Number Theoretic Ciphers - Jr. Wagstaff  Samuel S.

Cryptanalysis of Number Theoretic Ciphers

Buch | Hardcover
334 Seiten
2002
Chapman & Hall/CRC (Verlag)
978-1-58488-153-7 (ISBN)
168,35 inkl. MwSt
At the heart of modern cryptographic algorithms lies computational number theory. Written by a number theorist and practicing cryptographer, this book takes readers from basic number theory through the inner workings of ciphers and protocols, to their strengths and weaknesses.
At the heart of modern cryptographic algorithms lies computational number theory. Whether you're encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory to the inner workings of ciphers and protocols.

First, the book provides the mathematical background needed in cryptography as well as definitions and simple examples from cryptography. It includes summaries of elementary number theory and group theory, as well as common methods of finding or constructing large random primes, factoring large integers, and computing discrete logarithms. Next, it describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. For each attack method the author lists the systems it applies to and tells how they may be broken with it.

Computational number theorists are some of the most successful cryptanalysts against public key systems. Cryptanalysis of Number Theoretic Ciphers builds a solid foundation in number theory and shows you how to apply it not only when breaking ciphers, but also when designing ones that are difficult to break.

Samuel S. Wagstaff, Jr. is a professor at the Purdue University Center for Education and Research in Information Assurance and Security (CERIAS) in West Lafayette, Indiana.

MATHEMATICAL FOUNDATIONS OF CRYPTANALYSIS. Terminology of Cryptography. Probability Theory. Divisibility and Arithmetic. Primes. Congruences. Euler's Theorem and Its Consequences. Second Degree Congruences. Information Theory. Groups, Rings and Fields. Finding Large Primes. Exponential Methods of Factoring Integers. Elliptic Curves. Subexponential Factoring Algorithms. Computing Discrete Logarithms. Random Number Generation. THE CRYPTOGRAPHIC ALGORITHMS. Private Key Algorithms. Public Key Algorithms. Signature Algorithms. Key Exchange Algorithms. Simple Protocols. Complicated Protocols. Complete Systems. METHODS OF ATTACK. Direct Attacks. Exploiting a User Error. Active Attacks. References.

Erscheint lt. Verlag 10.12.2002
Reihe/Serie Computational Mathematics
Zusatzinfo 1 Tables, black and white; 7 Illustrations, black and white
Sprache englisch
Maße 156 x 234 mm
Gewicht 780 g
Themenwelt Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Mathematik Allgemeines / Lexika
Mathematik / Informatik Mathematik Analysis
ISBN-10 1-58488-153-4 / 1584881534
ISBN-13 978-1-58488-153-7 / 9781584881537
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich