THE LEGACY...First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.WHY A THIRD EDITION?The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:Pseudorandom bit generation in cryptographyEntity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemesKey establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofsPublic key infrastructure, including identity-based cryptographySecret sharing schemesMulticast security, including broadcast encryption and copyright protectionTHE RESULT...Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
Les mer
Offers coverage of the use of cryptographic protocols that establish the steps that must be taken before any type of secret transmission can be completed. This book shows readers how the various parties to the transaction establish their cryptographic identities or keys.
Les mer
CLASSICAL CRYPTOGRAPHYIntroduction: Some Simple CryptosystemsCryptanalysisNotesExercisesSHANNON'S THEORYIntroductionElementary Probability TheoryPerfect SecrecyEntropyProperties of EntropySpurious Keys and Unicity DistanceProduct CryptosystemsNotesExercisesBLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARDIntroductionSubstitution-Permutation NetworksLinear CryptanalysisDifferential CryptanalysisThe Data Encryption StandardThe Advanced Encryption StandardModes of OperationNotes and ReferencesExercisesCRYPTOGRAPHIC HASH FUNCTIONSHash Functions and Data IntegritySecurity of Hash FunctionsIterated Hash FunctionsMessage Authentication CodesUnconditionally Secure MACsNotes and ReferencesExercisesTHE RSA CRYPTOSYSTEM AND FACTORING INTEGERSIntroduction to Public-key CryptographyMore Number TheoryThe RSA CryptosystemPrimality TestingSquare Roots Modulo nFactoring AlgorithmsOther Attacks on RSAThe Rabin CryptosystemSemantic Security of RSANotes and ReferencesExercisesPUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMSThe ElGamal CryptosystemAlgorithms for the Discrete Logarithm ProblemLower Bounds on the Complexity of Generic AlgorithmsFinite FieldsElliptic CurvesDiscrete Logarithm Algorithms in PracticeSecurity of ElGamal SystemsNotes and ReferencesExercisesSIGNATURE SCHEMESIntroductionSecurity Requirements for Signature SchemesThe ElGamal Signature SchemeVariants of the ElGamal Signature SchemeProvably Secure Signature SchemesUndeniable SignaturesFail-stop SignaturesNotes and ReferencesExercisesPSEUDO-RANDOM NUMBER GENERATIONIntroduction and ExamplesIndistinguishability of Probability DistributionsThe Blum-Blum-Shub GeneratorProbabilistic EncryptionNotes and ReferencesExercisesIDENTIFICATION SCHEMES AND ENTITY AUTHENTICATIONIntroductionChallenge-and-Response in the Secret-Key SettingChallenge-and-Response in the Public-Key SettingThe Schnorr Identification SchemeThe Okamoto Identification SchemeThe Guillou-Quisquater Identification SchemeNotes and ReferencesExercisesKEY DISTRIBUTIONIntroductionDiffie-Hellman Key PredistributionUnconditionally Secure Key PredistributionKey Distribution PatternsSession Key Distribution SchemesNotes and ReferencesExercisesKEY AGREEMENT SCHEMESIntroductionDiffie-Hellman Key AgreementMTI Key Agreement SchemesKey Agreement Using Self-Certifying KeysEncrypted Key ExchangeConference Key Agreement SchemesNotes and ReferencesExercisesPUBLIC-KEY INFRASTRUCTUREIntroduction: What is a PKI?CertificatesTrust ModelsThe Future of PKI?Identity-Based CryptographyNotes and ReferencesExercisesSECRET SHARING SCHEMESIntroduction: The Shamir Threshold SchemeAccess Structures and General Secret SharingInformation Rate and Construction of Efficient SchemesNotes and ReferencesExercisesMULTICAST SECURITY AND COPYRIGHT PROTECTIONIntroduction to Multicast SecurityBroadcast EncryptionMulticast Re-KeyingCopyright ProtectionTracing Illegally Redistributed KeysNotes and ReferencesExercisesFURTHER READINGBIBLIOGRAPHYINDEX
Les mer
"It is by far the most suitable text for undergraduate and graduate courses on the subject in mathematics and computer science departments. Besides having breadth and scope in the choice of topics, many of them are dealt with in much more depth than what can be found elsewhere at this level . . . If you really want to learn some cryptography this is probably the best available text." - Peter Shiu, Department of Mathematical Sciences, Loughborough University, in The Mathematical Gazette, March 2007 ". . . the book is very well suited for a course in crypotography." - Bran van Asch, in Mathematical Reviews, 2007f
Les mer

Produktdetaljer

ISBN
9781584885085
Publisert
2005-11-01
Utgave
3. utgave
Utgiver
Vendor
Chapman & Hall/CRC
Vekt
998 gr
Høyde
234 mm
Bredde
156 mm
Aldersnivå
06, P
Språk
Product language
Engelsk
Format
Product format
Innbundet
Antall sider
616