Introduction to Cryptography: Principles and Applications / Edition 2

Introduction to Cryptography: Principles and Applications / Edition 2

by Hans Delfs, Helmut Knebl
     
 

View All Available Formats & Editions

ISBN-10: 3642080405

ISBN-13: 9783642080401

Pub. Date: 11/29/2010

Publisher: Springer Berlin Heidelberg

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on an undergraduate level,

Overview

Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.

In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic prools. Essential techniques are demonstrated in prools for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises.

The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.

Product Details

ISBN-13:
9783642080401
Publisher:
Springer Berlin Heidelberg
Publication date:
11/29/2010
Series:
Information Security and Cryptography Series
Edition description:
Softcover reprint of hardcover 2nd ed. 2007
Pages:
367
Product dimensions:
6.10(w) x 9.25(h) x 0.03(d)

Table of Contents


Introduction     1
Encryption and Secrecy     1
The Objectives of Cryptography     2
Attacks     4
Cryptographic Protocols     5
Provable Security     6
Symmetric-Key Encryption     11
Stream Ciphers     12
Block Ciphers     15
DES     16
AES     19
Modes of Operation     25
Public-Key Cryptography     33
The Concept of Public-Key Cryptography     33
Modular Arithmetic     35
The Integers     35
The Integers Modulo n     37
RSA     41
Key Generation and Encryption     41
Digital Signatures     45
Attacks Against RSA     46
Probabilistic RSA Encryption     51
Cryptographic Hash Functions     54
Security Requirements for Hash Functions     54
Construction of Hash Functions     56
Data Integrity and Message Authentication     62
Hash Functions as Random Functions     64
Signatures with Hash Functions     65
The Discrete Logarithm     70
ElGamal's Encryption     70
ElGamal's Signature Scheme     72
Digital Signature Algorithm     73
Modular Squaring     76
Rabin's Encryption     76
Rabin's Signature Scheme     77
Cryptographic Protocols     81
Key Exchange and Entity Authentication     81
Kerberos     82
Diffie-Hellman Key Agreement     85
Key Exchange and Mutual Authentication     86
Station-to-Station Protocol     88
Public-Key Management Techniques     89
Identification Schemes     91
Interactive Proof Systems     91
Simplified Fiat-Shamir Identification Scheme     93
Zero-Knowledge     95
Fiat-Shamir Identification Scheme     97
Fiat-Shamir Signature Scheme     99
Commitment Schemes     100
A Commitment Scheme Based on Quadratic Residues     101
A Commitment Scheme Based on Discrete Logarithms     102
Homomorphic Commitments     103
Electronic Elections     104
Secret Sharing     105
A Multi-Authority Election Scheme     107
Proofs of Knowledge     110
Non-Interactive Proofs of Knowledge     112
Extension to Multi-Way Elections     112
Eliminating the Trusted Center     113
Digital Cash     115
Blindly Issued Proofs     117
A Fair Electronic Cash System     123
Underlying Problems     128
Probabilistic Algorithms     135
Coin-Tossing Algorithms     135
Monte Carlo and Las Vegas Algorithms     140
One-Way Functions and the Basic Assumptions     147
A Notation for Probabilities     148
Discrete Exponential Function     149
Uniform Sampling Algorithms     155
Modular Powers     158
Modular Squaring     161
Quadratic Residuosity Property     162
Formal Definition of One-Way Functions     163
Hard-Core Predicates     167
Bit Security of One-Way Functions     175
Bit Security of the Exp Family     175
Bit Security of the RSA Family     182
Bit Security of the Square Family     190
One-Way Functions and Pseudorandomness     199
Computationally Perfect Pseudorandom Bit Generators     199
Yao's Theorem     207
Provably Secure Encryption     215
Classical Information-Theoretic Security      216
Perfect Secrecy and Probabilistic Attacks     220
Public-Key One-Time Pads     224
Passive Eavesdroppers     226
Chosen-Ciphertext Attacks     233
A Security Proof in the Random Oracle Model     236
Security Under Standard Assumptions     245
Unconditional Security of Cryptosystems     250
The Bounded Storage Model     251
The Noisy Channel Model     260
Provably Secure Digital Signatures     265
Attacks and Levels of Security     265
Claw-Free Pairs and Collision-Resistant Hash Functions     268
Authentication-Tree-Based Signatures     271
A State-Free Signature Scheme     273
Algebra and Number Theory     289
The Integers     289
Residues     295
The Chinese Remainder Theorem     299
Primitive Roots and the Discrete Logarithm     301
Polynomials and Finite Fields     304
The Ring of Polynomials     305
Residue Class Rings     307
Finite Fields     308
Quadratic Residues     310
Modular Square Roots     315
Primes and Primality Tests     319
Probabilities and Information Theory     325
Finite Probability Spaces and Random Variables     325
The Weak Law of Large Numbers     333
Distance Measures     336
Basic Concepts of Information Theory     340
References     349
Index     361

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >