Cryptography - Douglas R. Stinson

Cryptography

Theory and Practice, Third Edition
Buch | Hardcover
616 Seiten
2005 | 3rd New edition
Chapman & Hall/CRC (Verlag)
978-1-58488-508-5 (ISBN)
68,55 inkl. MwSt
  • Titel ist leider vergriffen;
    keine Neuauflage
  • Artikel merken
Offers coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. This book shows readers how the various parties to the transaction establish their cryptographic identities or keys.
THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
Pseudorandom bit generation in cryptography

Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes

Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs

Public key infrastructure, including identity-based cryptography

Secret sharing schemes

Multicast security, including broadcast encryption and copyright protection

THE RESULT…

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

CLASSICAL CRYPTOGRAPHY
Introduction: Some Simple Cryptosystems
Cryptanalysis
Notes
Exercises

SHANNON'S THEORY
Introduction
Elementary Probability Theory
Perfect Secrecy
Entropy
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Notes
Exercises

BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
Introduction
Substitution-Permutation Networks
Linear Cryptanalysis
Differential Cryptanalysis
The Data Encryption Standard
The Advanced Encryption Standard
Modes of Operation
Notes and References
Exercises

CRYPTOGRAPHIC HASH FUNCTIONS
Hash Functions and Data Integrity
Security of Hash Functions
Iterated Hash Functions
Message Authentication Codes
Unconditionally Secure MACs
Notes and References
Exercises

THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
Introduction to Public-key Cryptography
More Number Theory
The RSA Cryptosystem
Primality Testing
Square Roots Modulo n
Factoring Algorithms
Other Attacks on RSA
The Rabin Cryptosystem
Semantic Security of RSA
Notes and References
Exercises

PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
The ElGamal Cryptosystem
Algorithms for the Discrete Logarithm Problem
Lower Bounds on the Complexity of Generic Algorithms
Finite Fields
Elliptic Curves
Discrete Logarithm Algorithms in Practice
Security of ElGamal Systems
Notes and References
Exercises

SIGNATURE SCHEMES
Introduction
Security Requirements for Signature Schemes
The ElGamal Signature Scheme
Variants of the ElGamal Signature Scheme
Provably Secure Signature Schemes
Undeniable Signatures
Fail-stop Signatures
Notes and References
Exercises

PSEUDO-RANDOM NUMBER GENERATION
Introduction and Examples
Indistinguishability of Probability Distributions
The Blum-Blum-Shub Generator
Probabilistic Encryption
Notes and References
Exercises

IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
Introduction
Challenge-and-Response in the Secret-Key Setting
Challenge-and-Response in the Public-Key Setting
The Schnorr Identification Scheme
The Okamoto Identification Scheme
The Guillou-Quisquater Identification Scheme
Notes and References
Exercises

KEY DISTRIBUTION
Introduction
Diffie-Hellman Key Predistribution
Unconditionally Secure Key Predistribution
Key Distribution Patterns
Session Key Distribution Schemes
Notes and References
Exercises

KEY AGREEMENT SCHEMES
Introduction
Diffie-Hellman Key Agreement
MTI Key Agreement Schemes
Key Agreement Using Self-Certifying Keys
Encrypted Key Exchange
Conference Key Agreement Schemes
Notes and References
Exercises

PUBLIC-KEY INFRASTRUCTURE
Introduction: What is a PKI?
Certificates
Trust Models
The Future of PKI?
Identity-Based Cryptography
Notes and References
Exercises

SECRET SHARING SCHEMES
Introduction: The Shamir Threshold Scheme
Access Structures and General Secret Sharing
Information Rate and Construction of Efficient Schemes
Notes and References
Exercises

MULTICAST SECURITY AND COPYRIGHT PROTECTION
Introduction to Multicast Security
Broadcast Encryption
Multicast Re-Keying
Copyright Protection
Tracing Illegally Redistributed Keys
Notes and References
Exercises
FURTHER READING
BIBLIOGRAPHY
INDEX

Erscheint lt. Verlag 1.11.2005
Reihe/Serie Discrete Mathematics and its Applications
Zusatzinfo 18 Tables, black and white; 27 Illustrations, black and white
Sprache englisch
Maße 156 x 234 mm
Gewicht 998 g
Themenwelt Informatik Theorie / Studium Kryptologie
Mathematik / Informatik Mathematik
ISBN-10 1-58488-508-4 / 1584885084
ISBN-13 978-1-58488-508-5 / 9781584885085
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich