Cryptography
Chapman & Hall/CRC (Verlag)
978-1-58488-508-5 (ISBN)
- Titel ist leider vergriffen;
keine Neuauflage - Artikel merken
THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.
WHY A THIRD EDITION?
The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography
Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
Public key infrastructure, including identity-based cryptography
Secret sharing schemes
Multicast security, including broadcast encryption and copyright protection
THE RESULT…
Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
CLASSICAL CRYPTOGRAPHY
Introduction: Some Simple Cryptosystems
Cryptanalysis
Notes
Exercises
SHANNON'S THEORY
Introduction
Elementary Probability Theory
Perfect Secrecy
Entropy
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Notes
Exercises
BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
Introduction
Substitution-Permutation Networks
Linear Cryptanalysis
Differential Cryptanalysis
The Data Encryption Standard
The Advanced Encryption Standard
Modes of Operation
Notes and References
Exercises
CRYPTOGRAPHIC HASH FUNCTIONS
Hash Functions and Data Integrity
Security of Hash Functions
Iterated Hash Functions
Message Authentication Codes
Unconditionally Secure MACs
Notes and References
Exercises
THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
Introduction to Public-key Cryptography
More Number Theory
The RSA Cryptosystem
Primality Testing
Square Roots Modulo n
Factoring Algorithms
Other Attacks on RSA
The Rabin Cryptosystem
Semantic Security of RSA
Notes and References
Exercises
PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
The ElGamal Cryptosystem
Algorithms for the Discrete Logarithm Problem
Lower Bounds on the Complexity of Generic Algorithms
Finite Fields
Elliptic Curves
Discrete Logarithm Algorithms in Practice
Security of ElGamal Systems
Notes and References
Exercises
SIGNATURE SCHEMES
Introduction
Security Requirements for Signature Schemes
The ElGamal Signature Scheme
Variants of the ElGamal Signature Scheme
Provably Secure Signature Schemes
Undeniable Signatures
Fail-stop Signatures
Notes and References
Exercises
PSEUDO-RANDOM NUMBER GENERATION
Introduction and Examples
Indistinguishability of Probability Distributions
The Blum-Blum-Shub Generator
Probabilistic Encryption
Notes and References
Exercises
IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
Introduction
Challenge-and-Response in the Secret-Key Setting
Challenge-and-Response in the Public-Key Setting
The Schnorr Identification Scheme
The Okamoto Identification Scheme
The Guillou-Quisquater Identification Scheme
Notes and References
Exercises
KEY DISTRIBUTION
Introduction
Diffie-Hellman Key Predistribution
Unconditionally Secure Key Predistribution
Key Distribution Patterns
Session Key Distribution Schemes
Notes and References
Exercises
KEY AGREEMENT SCHEMES
Introduction
Diffie-Hellman Key Agreement
MTI Key Agreement Schemes
Key Agreement Using Self-Certifying Keys
Encrypted Key Exchange
Conference Key Agreement Schemes
Notes and References
Exercises
PUBLIC-KEY INFRASTRUCTURE
Introduction: What is a PKI?
Certificates
Trust Models
The Future of PKI?
Identity-Based Cryptography
Notes and References
Exercises
SECRET SHARING SCHEMES
Introduction: The Shamir Threshold Scheme
Access Structures and General Secret Sharing
Information Rate and Construction of Efficient Schemes
Notes and References
Exercises
MULTICAST SECURITY AND COPYRIGHT PROTECTION
Introduction to Multicast Security
Broadcast Encryption
Multicast Re-Keying
Copyright Protection
Tracing Illegally Redistributed Keys
Notes and References
Exercises
FURTHER READING
BIBLIOGRAPHY
INDEX
Erscheint lt. Verlag | 1.11.2005 |
---|---|
Reihe/Serie | Discrete Mathematics and its Applications |
Zusatzinfo | 18 Tables, black and white; 27 Illustrations, black and white |
Sprache | englisch |
Maße | 156 x 234 mm |
Gewicht | 998 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Mathematik / Informatik ► Mathematik | |
ISBN-10 | 1-58488-508-4 / 1584885084 |
ISBN-13 | 978-1-58488-508-5 / 9781584885085 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich