Amazon cover image
Image from Amazon.com
Image from Google Jackets
Image from OpenLibrary

Cryptography : Theory and Practice

By: Material type: TextTextPublication details: Boca Raton Chapman & Hall/CRC 2006Edition: 3rd ed [ Special Indian Edition ]Description: 593 p. : ill. ; 25 cmISBN:
  • 9781584885085
Subject(s): DDC classification:
  • 005.82 STI-C
Contents:
CLASSICAL CRYPTOGRAPHY Introduction: Some Simple Cryptosystems Cryptanalysis Notes Exercises SHANNON'S THEORY Introduction Elementary Probability Theory Perfect Secrecy Entropy Properties of Entropy Spurious Keys and Unicity Distance Product Cryptosystems Notes Exercises BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD Introduction Substitution-Permutation Networks Linear Cryptanalysis Differential Cryptanalysis The Data Encryption Standard The Advanced Encryption Standard Modes of Operation Notes and References Exercises CRYPTOGRAPHIC HASH FUNCTIONS Hash Functions and Data Integrity Security of Hash Functions Iterated Hash Functions Message Authentication Codes Unconditionally Secure MACs Notes and References Exercises THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS Introduction to Public-key Cryptography More Number Theory The RSA Cryptosystem Primality Testing Square Roots Modulo n Factoring Algorithms Other Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Notes and References Exercises PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS The ElGamal Cryptosystem Algorithms for the Discrete Logarithm Problem Lower Bounds on the Complexity of Generic Algorithms Finite Fields Elliptic Curves Discrete Logarithm Algorithms in Practice Security of ElGamal Systems Notes and References Exercises SIGNATURE SCHEMES Introduction Security Requirements for Signature Schemes The ElGamal Signature Scheme Variants of the ElGamal Signature Scheme Provably Secure Signature Schemes Undeniable Signatures Fail-stop Signatures Notes and References Exercises PSEUDO-RANDOM NUMBER GENERATION Introduction and Examples Indistinguishability of Probability Distributions The Blum-Blum-Shub Generator Probabilistic Encryption Notes and References Exercises IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION Introduction Challenge-and-Response in the Secret-Key Setting Challenge-and-Response in the Public-Key Setting The Schnorr Identification Scheme The Okamoto Identification Scheme The Guillou-Quisquater Identification Scheme Notes and References Exercises KEY DISTRIBUTION Introduction Diffie-Hellman Key Predistribution Unconditionally Secure Key Predistribution Key Distribution Patterns Session Key Distribution Schemes Notes and References Exercises KEY AGREEMENT SCHEMES Introduction Diffie-Hellman Key Agreement MTI Key Agreement Schemes Key Agreement Using Self-Certifying Keys Encrypted Key Exchange Conference Key Agreement Schemes Notes and References Exercises PUBLIC-KEY INFRASTRUCTURE Introduction: What is a PKI? Certificates Trust Models The Future of PKI? Identity-Based Cryptography Notes and References Exercises SECRET SHARING SCHEMES Introduction: The Shamir Threshold Scheme Access Structures and General Secret Sharing Information Rate and Construction of Efficient Schemes Notes and References Exercises MULTICAST SECURITY AND COPYRIGHT PROTECTION Introduction to Multicast Security Broadcast Encryption Multicast Re-Keying Copyright Protection Tracing Illegally Redistributed Keys Notes and References Exercises FURTHER READING BIBLIOGRAPHY INDEX
Summary: First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography. WHY A THIRD EDITION? The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: Pseudorandom bit generation in cryptography Entity authentication, including schemes built from primitives and special purpose \zero-knowledge\ schemes Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs Public key infrastructure, including identity-based cryptography Secret sharing schemes Multicast security, including broadcast encryption and copyright protection THE RESULT Providing mathematical background in a \just-in-time\ fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
Tags from this library: No tags from this library for this title. Log in to add tags.
Holdings
Item type Current library Home library Call number Status Date due Barcode
Book Book Dept. of Computational Biology and Bioinformatics Processing Center Dept. of Computational Biology and Bioinformatics 005.82 STI-C (Browse shelf(Opens below)) Available DCB2212

CLASSICAL CRYPTOGRAPHY Introduction: Some Simple Cryptosystems Cryptanalysis Notes Exercises SHANNON'S THEORY Introduction Elementary Probability Theory Perfect Secrecy Entropy Properties of Entropy Spurious Keys and Unicity Distance Product Cryptosystems Notes Exercises BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD Introduction Substitution-Permutation Networks Linear Cryptanalysis Differential Cryptanalysis The Data Encryption Standard The Advanced Encryption Standard Modes of Operation Notes and References Exercises CRYPTOGRAPHIC HASH FUNCTIONS Hash Functions and Data Integrity Security of Hash Functions Iterated Hash Functions Message Authentication Codes Unconditionally Secure MACs Notes and References Exercises THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS Introduction to Public-key Cryptography More Number Theory The RSA Cryptosystem Primality Testing Square Roots Modulo n Factoring Algorithms Other Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Notes and References Exercises PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS The ElGamal Cryptosystem Algorithms for the Discrete Logarithm Problem Lower Bounds on the Complexity of Generic Algorithms Finite Fields Elliptic Curves Discrete Logarithm Algorithms in Practice Security of ElGamal Systems Notes and References Exercises SIGNATURE SCHEMES Introduction Security Requirements for Signature Schemes The ElGamal Signature Scheme Variants of the ElGamal Signature Scheme Provably Secure Signature Schemes Undeniable Signatures Fail-stop Signatures Notes and References Exercises PSEUDO-RANDOM NUMBER GENERATION Introduction and Examples Indistinguishability of Probability Distributions The Blum-Blum-Shub Generator Probabilistic Encryption Notes and References Exercises IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION Introduction Challenge-and-Response in the Secret-Key Setting Challenge-and-Response in the Public-Key Setting The Schnorr Identification Scheme The Okamoto Identification Scheme The Guillou-Quisquater Identification Scheme Notes and References Exercises KEY DISTRIBUTION Introduction Diffie-Hellman Key Predistribution Unconditionally Secure Key Predistribution Key Distribution Patterns Session Key Distribution Schemes Notes and References Exercises KEY AGREEMENT SCHEMES Introduction Diffie-Hellman Key Agreement MTI Key Agreement Schemes Key Agreement Using Self-Certifying Keys Encrypted Key Exchange Conference Key Agreement Schemes Notes and References Exercises PUBLIC-KEY INFRASTRUCTURE Introduction: What is a PKI? Certificates Trust Models The Future of PKI? Identity-Based Cryptography Notes and References Exercises SECRET SHARING SCHEMES Introduction: The Shamir Threshold Scheme Access Structures and General Secret Sharing Information Rate and Construction of Efficient Schemes Notes and References Exercises MULTICAST SECURITY AND COPYRIGHT PROTECTION Introduction to Multicast Security Broadcast Encryption Multicast Re-Keying Copyright Protection Tracing Illegally Redistributed Keys Notes and References Exercises FURTHER READING BIBLIOGRAPHY INDEX

First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography. WHY A THIRD EDITION? The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: Pseudorandom bit generation in cryptography Entity authentication, including schemes built from primitives and special purpose \zero-knowledge\ schemes Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs Public key infrastructure, including identity-based cryptography Secret sharing schemes Multicast security, including broadcast encryption and copyright protection THE RESULT Providing mathematical background in a \just-in-time\ fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

There are no comments on this title.

to post a comment.