Cryptography: Theory and Practice / Edition 3

Hardcover (Print)
Rent
Rent from BN.com
$14.16
(Save 81%)
Est. Return Date: 11/18/2014
Used and New from Other Sellers
Used and New from Other Sellers
from $32.00
Usually ships in 1-2 business days
(Save 56%)
Other sellers (Hardcover)
  • All (15) from $32.00   
  • New (7) from $62.82   
  • Used (8) from $32.00   

Overview

THE LEGACY…
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:

  • Pseudorandom bit generation in cryptography
  • Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
  • Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
  • Public key infrastructure, including identity-based cryptography
  • Secret sharing schemes
  • Multicast security, including broadcast encryption and copyright protection

THE RESULT…

Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

The Advanced Encryption Standard (AES), elliptic curve DSA, the secure hash algorithm…these and other major advances over that last five years demanded this comprehensive revision of the standard-setting text and reference, Cryptography: Theory and Practice. Now more tightly focused on the core areas, it contains many new topics as well as thoroughly updated treatments of topics presented in the first edition. There is increased emphasis on general concepts, but the outstanding features that first made this a bestseller all remain, including its mathematical rigor, numerous examples, pseudocode descriptions of algorithms, and clear, precise explanations.New in the Second Edition:·Explains the latest Federal Information Processing Standards , including the Advanced Encryption Standard (AES), the Secure Has Algorithm (SHA-1), and the Elliptic Curve Digital Signature Algorithm (ECDSA)·Uses substitution-permutation networks to introduce block cipher design and analysis concepts·Explains both linear and differential cryptanalysis·Presents the Random Oracle model for hash functions·Addresses semantic security of RSA and Optional Asymmetric Encryption Padding·Discusses Wiener's attach on low decryption exponent RSA Overwhelmingly popular and relied upon in its first edition, now, more than ever, Cryptography: Theory and Practice provides an introduction to the field ideal for upper-level students in both mathematics and computer science.More highlights of the Second Edition:·Provably secure signature schemes: Full Domain Hash·Universal hash families·Expanded treatment of message authentication codes·More discussions on elliptic curves·Lower bounds for the complexity ofgeneric algorithms for the discrete logarithm problem·Expanded treatment of factoring algorithms·Security definitions for signature schemes

Read More Show Less

Editorial Reviews

From the Publisher
"It is by far the most suitable text for undergraduate and graduate courses on the subject in mathematics and computer science departments. Besides having breadth and scope in the choice of topics, many of them are dealt with in much more depth than what can be found elsewhere at this level . . . If you really want to learn some cryptography this is probably the best available text."

– Peter Shiu, Department of Mathematical Sciences, Loughborough University, in The Mathematical Gazette, March 2007

". . . the book is very well suited for a course in crypotography."

– Bran van Asch, in Mathematical Reviews, 2007f

From The Critics
An expanded edition of an introductory text covering the core areas of cryptography. Author Stinson (combinatorics and optimization, U. of Waterloo, Ontario) assumes readers have a basic familiarity with linear algebra, number theory, probability, and information theory, and he writes that some familiarity with computation complexity, algorithms, and NP-completeness theory is helpful. Topics include "classical" cryptosystems, Shannon's approach to cryptography, modern block cipher design and analysis, keyed and unkeyed hash functions, the RSA Cryptosystem, public-key cryptosystems, and signature schemes. Annotation c. Book News, Inc., Portland, OR (booknews.com)
Read More Show Less

Product Details

  • ISBN-13: 9781584885085
  • Publisher: Taylor & Francis
  • Publication date: 11/28/2005
  • Series: Discrete Mathematics and Its Applications Series
  • Edition description: REV
  • Edition number: 3
  • Pages: 616
  • Sales rank: 854,808
  • Product dimensions: 6.20 (w) x 9.40 (h) x 1.50 (d)

Table of Contents

CLASSICAL CRYPTOGRAPHY
Introduction: Some Simple Cryptosystems
Cryptanalysis
Notes
Exercises

SHANNON'S THEORY
Introduction
Elementary Probability Theory
Perfect Secrecy
Entropy
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Notes
Exercises

BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
Introduction
Substitution-Permutation Networks
Linear Cryptanalysis
Differential Cryptanalysis
The Data Encryption Standard
The Advanced Encryption Standard
Modes of Operation
Notes and References
Exercises

CRYPTOGRAPHIC HASH FUNCTIONS
Hash Functions and Data Integrity
Security of Hash Functions
Iterated Hash Functions
Message Authentication Codes
Unconditionally Secure MACs
Notes and References
Exercises

THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
Introduction to Public-key Cryptography
More Number Theory
The RSA Cryptosystem
Primality Testing
Square Roots Modulo n
Factoring Algorithms
Other Attacks on RSA
The Rabin Cryptosystem
Semantic Security of RSA
Notes and References
Exercises

PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
The ElGamal Cryptosystem
Algorithms for the Discrete Logarithm Problem
Lower Bounds on the Complexity of Generic Algorithms
Finite Fields
Elliptic Curves
Discrete Logarithm Algorithms in Practice
Security of ElGamal Systems
Notes and References
Exercises

SIGNATURE SCHEMES
Introduction
Security Requirements for Signature Schemes
The ElGamal Signature Scheme
Variants of the ElGamal Signature Scheme
Provably Secure Signature Schemes
Undeniable Signatures
Fail-stop Signatures
Notes and References
Exercises

PSEUDO-RANDOM NUMBER GENERATION
Introduction and Examples
Indistinguishability of Probability Distributions
The Blum-Blum-Shub Generator
Probabilistic Encryption
Notes and References
Exercises

IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
Introduction
Challenge-and-Response in the Secret-Key Setting
Challenge-and-Response in the Public-Key Setting
The Schnorr Identification Scheme
The Okamoto Identification Scheme
The Guillou-Quisquater Identification Scheme
Notes and References
Exercises

KEY DISTRIBUTION
Introduction
Diffie-Hellman Key Predistribution
Unconditionally Secure Key Predistribution
Key Distribution Patterns
Session Key Distribution Schemes
Notes and References
Exercises

KEY AGREEMENT SCHEMES
Introduction
Diffie-Hellman Key Agreement
MTI Key Agreement Schemes
Key Agreement Using Self-Certifying Keys
Encrypted Key Exchange
Conference Key Agreement Schemes
Notes and References
Exercises

PUBLIC-KEY INFRASTRUCTURE
Introduction: What is a PKI?
Certificates
Trust Models
The Future of PKI?
Identity-Based Cryptography
Notes and References
Exercises

SECRET SHARING SCHEMES
Introduction: The Shamir Threshold Scheme
Access Structures and General Secret Sharing
Information Rate and Construction of Efficient Schemes
Notes and References
Exercises

MULTICAST SECURITY AND COPYRIGHT PROTECTION
Introduction to Multicast Security
Broadcast Encryption
Multicast Re-Keying
Copyright Protection
Tracing Illegally Redistributed Keys
Notes and References
Exercises
FURTHER READING
BIBLIOGRAPHY
INDEX

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted July 31, 2009

    No text was provided for this review.

  • Anonymous

    Posted May 1, 2010

    No text was provided for this review.

Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)