Modern Cryptography: Theory and Practice

Modern Cryptography: Theory and Practice

by Wenbo Mao
     
 

ISBN-10: 0130669431

ISBN-13: 9780130669438

Pub. Date: 07/25/2003

Publisher: Prentice Hall

Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It…  See more details below

Overview

Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography.

Read More

Product Details

ISBN-13:
9780130669438
Publisher:
Prentice Hall
Publication date:
07/25/2003
Series:
HP Professional Series
Pages:
707
Product dimensions:
7.10(w) x 9.50(h) x 1.55(d)

Table of Contents

A Short Description of the Book
Preface
List of Figures
List of Algorithms, Protocols and Attacks
IIntroduction1
1Beginning with a Simple Communication Game3
2Wrestling Between Safeguard and Attack23
IIMathematical Foundations55
Standard Notation57
3Probability and Information Theory61
4Computational Complexity85
5Algebraic Foundations139
6Number Theory175
IIIBasic Cryptographic Techniques203
7Encryption - Symmetric Techniques205
8Encryption - Asymmetric Techniques245
9In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions285
10Data Integrity Techniques297
IVAuthentication327
11Authentication Protocols - Principles329
12Authentication Protocols - The Real World387
13Authentication Framework for Public-Key Cryptography427
VFormal Approaches to Security Establishment459
14Formal and Strong Security Definitions for Public-Key Cryptosystems461
15Provably Secure and Efficient Public-Key Cryptosystems501
16Strong and Provable Security for Digital Signatures545
17Formal Methods for Authentication Protocols Analysis577
VICryptographic Protocols617
18Zero-Knowledge Protocols619
19Returning to "Coin Flipping Over Telephone"665
20Afterremark671
Bibliography673
Subject Index699

Read More

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >