<p>"It is by far the most suitable text for undergraduate and graduate courses on the subject in mathematics and computer science departments. Besides having breadth and scope in the choice of topics, many of them are dealt with in much more depth than what can be found elsewhere at this level . . . If you really want to learn some cryptography this is probably the best available text." </p>
<p>- Peter Shiu, Department of Mathematical Sciences, Loughborough University, in <em>The Mathematical Gazette</em>, March 2007</p>
<p>". . . the book is very well suited for a course in crypotography." </p>
<p>- Bran van Asch, in<em> Mathematical Reviews</em>, 2007f</p>

THE LEGACY...
First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

WHY A THIRD EDITION?

The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:
  • Pseudorandom bit generation in cryptography
  • Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
  • Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
  • Public key infrastructure, including identity-based cryptography
  • Secret sharing schemes
  • Multicast security, including broadcast encryption and copyright protection

    THE RESULT...

    Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
  • Les mer
    Offers coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. This book shows readers how the various parties to the transaction establish their cryptographic identities or keys.
    Les mer
    CLASSICAL CRYPTOGRAPHY
    Introduction: Some Simple Cryptosystems
    Cryptanalysis
    Notes
    Exercises

    SHANNON'S THEORY
    Introduction
    Elementary Probability Theory
    Perfect Secrecy
    Entropy
    Properties of Entropy
    Spurious Keys and Unicity Distance
    Product Cryptosystems
    Notes
    Exercises

    BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
    Introduction
    Substitution-Permutation Networks
    Linear Cryptanalysis
    Differential Cryptanalysis
    The Data Encryption Standard
    The Advanced Encryption Standard
    Modes of Operation
    Notes and References
    Exercises

    CRYPTOGRAPHIC HASH FUNCTIONS
    Hash Functions and Data Integrity
    Security of Hash Functions
    Iterated Hash Functions
    Message Authentication Codes
    Unconditionally Secure MACs
    Notes and References
    Exercises

    THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
    Introduction to Public-key Cryptography
    More Number Theory
    The RSA Cryptosystem
    Primality Testing
    Square Roots Modulo n
    Factoring Algorithms
    Other Attacks on RSA
    The Rabin Cryptosystem
    Semantic Security of RSA
    Notes and References
    Exercises

    PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
    The ElGamal Cryptosystem
    Algorithms for the Discrete Logarithm Problem
    Lower Bounds on the Complexity of Generic Algorithms
    Finite Fields
    Elliptic Curves
    Discrete Logarithm Algorithms in Practice
    Security of ElGamal Systems
    Notes and References
    Exercises

    SIGNATURE SCHEMES
    Introduction
    Security Requirements for Signature Schemes
    The ElGamal Signature Scheme
    Variants of the ElGamal Signature Scheme
    Provably Secure Signature Schemes
    Undeniable Signatures
    Fail-stop Signatures
    Notes and References
    Exercises

    PSEUDO-RANDOM NUMBER GENERATION
    Introduction and Examples
    Indistinguishability of Probability Distributions
    The Blum-Blum-Shub Generator
    Probabilistic Encryption
    Notes and References
    Exercises

    IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
    Introduction
    Challenge-and-Response in the Secret-Key Setting
    Challenge-and-Response in the Public-Key Setting
    The Schnorr Identification Scheme
    The Okamoto Identification Scheme
    The Guillou-Quisquater Identification Scheme
    Notes and References
    Exercises

    KEY DISTRIBUTION
    Introduction
    Diffie-Hellman Key Predistribution
    Unconditionally Secure Key Predistribution
    Key Distribution Patterns
    Session Key Distribution Schemes
    Notes and References
    Exercises

    KEY AGREEMENT SCHEMES
    Introduction
    Diffie-Hellman Key Agreement
    MTI Key Agreement Schemes
    Key Agreement Using Self-Certifying Keys
    Encrypted Key Exchange
    Conference Key Agreement Schemes
    Notes and References
    Exercises

    PUBLIC-KEY INFRASTRUCTURE
    Introduction: What is a PKI?
    Certificates
    Trust Models
    The Future of PKI?
    Identity-Based Cryptography
    Notes and References
    Exercises

    SECRET SHARING SCHEMES
    Introduction: The Shamir Threshold Scheme
    Access Structures and General Secret Sharing
    Information Rate and Construction of Efficient Schemes
    Notes and References
    Exercises

    MULTICAST SECURITY AND COPYRIGHT PROTECTION
    Introduction to Multicast Security
    Broadcast Encryption
    Multicast Re-Keying
    Copyright Protection
    Tracing Illegally Redistributed Keys
    Notes and References
    Exercises
    FURTHER READING
    BIBLIOGRAPHY
    INDEX
    Les mer

    Produktdetaljer

    ISBN
    9781584885085
    Publisert
    2005-11-01
    Utgave
    3. utgave
    Utgiver
    Vendor
    Chapman & Hall/CRC
    Vekt
    998 gr
    Høyde
    234 mm
    Bredde
    156 mm
    Aldersnivå
    06, P
    Språk
    Product language
    Engelsk
    Format
    Product format
    Innbundet
    Antall sider
    616