Loading...
Cryptography : Theory and Practice
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this a...
Main Author: | |
---|---|
Format: | Printed Book |
Published: |
Boca Raton
Chapman & Hall/CRC
2006
|
Edition: | 3rd ed [ Special Indian Edition ] |
Subjects: |
Table of Contents:
- CLASSICAL CRYPTOGRAPHY Introduction: Some Simple Cryptosystems Cryptanalysis Notes Exercises SHANNON'S THEORY Introduction Elementary Probability Theory Perfect Secrecy Entropy Properties of Entropy Spurious Keys and Unicity Distance Product Cryptosystems Notes Exercises BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD Introduction Substitution-Permutation Networks Linear Cryptanalysis Differential Cryptanalysis The Data Encryption Standard The Advanced Encryption Standard Modes of Operation Notes and References Exercises CRYPTOGRAPHIC HASH FUNCTIONS Hash Functions and Data Integrity Security of Hash Functions Iterated Hash Functions Message Authentication Codes Unconditionally Secure MACs Notes and References Exercises THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS Introduction to Public-key Cryptography More Number Theory The RSA Cryptosystem Primality Testing Square Roots Modulo n Factoring Algorithms Other Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Notes and References Exercises PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS The ElGamal Cryptosystem Algorithms for the Discrete Logarithm Problem Lower Bounds on the Complexity of Generic Algorithms Finite Fields Elliptic Curves Discrete Logarithm Algorithms in Practice Security of ElGamal Systems Notes and References Exercises SIGNATURE SCHEMES Introduction Security Requirements for Signature Schemes The ElGamal Signature Scheme Variants of the ElGamal Signature Scheme Provably Secure Signature Schemes Undeniable Signatures Fail-stop Signatures Notes and References Exercises PSEUDO-RANDOM NUMBER GENERATION Introduction and Examples Indistinguishability of Probability Distributions The Blum-Blum-Shub Generator Probabilistic Encryption Notes and References Exercises IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION Introduction Challenge-and-Response in the Secret-Key Setting Challenge-and-Response in the Public-Key Setting The Schnorr Identification Scheme The Okamoto Identification Scheme The Guillou-Quisquater Identification Scheme Notes and References Exercises KEY DISTRIBUTION Introduction Diffie-Hellman Key Predistribution Unconditionally Secure Key Predistribution Key Distribution Patterns Session Key Distribution Schemes Notes and References Exercises KEY AGREEMENT SCHEMES Introduction Diffie-Hellman Key Agreement MTI Key Agreement Schemes Key Agreement Using Self-Certifying Keys Encrypted Key Exchange Conference Key Agreement Schemes Notes and References Exercises PUBLIC-KEY INFRASTRUCTURE Introduction: What is a PKI? Certificates Trust Models The Future of PKI? Identity-Based Cryptography Notes and References Exercises SECRET SHARING SCHEMES Introduction: The Shamir Threshold Scheme Access Structures and General Secret Sharing Information Rate and Construction of Efficient Schemes Notes and References Exercises MULTICAST SECURITY AND COPYRIGHT PROTECTION Introduction to Multicast Security Broadcast Encryption Multicast Re-Keying Copyright Protection Tracing Illegally Redistributed Keys Notes and References Exercises FURTHER READING BIBLIOGRAPHY INDEX