Cryptography
John Wiley & Sons Inc (Verlag)
978-1-394-20748-0 (ISBN)
Cryptography is one of the most important aspects of information technology security, central to the protection of digital assets and the mitigation of risks that come with increased global connectivity. The digital world is wholly reliant on secure algorithms and protocols for establishing identity, protecting user data, and more. Groundbreaking recent developments in network communication and a changing digital landscape have been accompanied by similar advances in cryptography, which is more central to digital life than ever before.
This book constitutes a comprehensive yet accessible introduction to the algorithms, protocols, and standards which protect the modern internet. Built around both foundational theories and hundreds of specific algorithms, it also incorporates the required skills in complex mathematics. The result is an indispensable introduction to the protocols and systems which should define cryptography for decades to come.
Readers will also find:
Over 450 problems with accompanying solutions to reinforce key concepts and test retention
Detailed discussion of topics including symmetric and asymmetric algorithms, random number generation, user authentication, and many more
Over 200 figures and tables that provide rich detail to the content
Cryptography: Algorithms, Protocols, and Standards for Computer Security is ideal for undergraduate and graduate students in cryptography and information technology subjects, as well as for researchers looking for a working reference on existing cryptographic algorithms and protocols.
Zoubir Mammeri, PhD, is a Full Professor at Paul Sabatier University in Toulouse, France. He teaches a variety of computer science subjects. He has published extensively on cybersecurity and related subjects, and has served as expert and evaluator in research programs of the European Commission and the French National Research Agency on communication networks and their security.
Preface xviii
1 Introduction to Computer Security 1
1.1 Introduction 1
1.2 Security Terms and Definitions 4
1.3 Security Services 6
1.4 Attacks 8
1.5 Countermeasures/Defenses 16
1.6 Overview of Defense Systems 20
1.7 Introduction to Privacy Protection 26
1.8 Concluding Remarks 29
1.9 Exercises and Solutions 29
2 Introduction to Cryptography 33
2.1 Definitions of Basic Terms 33
2.2 Cryptographic Primitives 39
2.3 Fundamental Properties of Cryptographic Algorithms 43
2.4 Attacks Against Cryptographic Algorithms 45
2.5 Steganography 51
2.6 Exercises and Problems 52
3 Mathematical Basics and Computation Algorithms for Cryptography 59
3.1 Number Theory Notations, Definitions, and Theorems 59
3.2 Basic Algebraic Structures 66
3.3 Computation Algorithms 80
3.4 Birthday Paradox and Its Generalization 92
3.5 Solutions to Exercises and Problems 93
4 Symmetric Ciphering: Historical Ciphers 117
4.1 Definitions 117
4.2 Caesar’s Cipher 117
4.3 Affine Ciphers 118
4.4 Vigenere’s Cipher 120
4.5 Enigma Machine 122
4.6 One-time Pad 133
4.7 Exercises and Problems 133
5 Hash Functions, Message Authentication Codes, and Digital Signature 142
5.1 Hash Functions 142
5.2 Secure Hash Algorithms (SHA) 146
5.3 Message Authentication Codes 157
5.4 Digital Signature 161
5.5 Concluding Remarks 163
5.6 Problems 163
6 Stream Ciphers 173
6.1 Stream Ciphers 173
6.2 Examples of Standard Keystream Generators 182
6.3 Exercises and Problems 197
7 Block Ciphers: Basics, TDEA, and AES 207
7.1 Construction Principles for Block Cipher Design 207
7.2 Triple Data Encryption Algorithm (TDEA) 211
7.3 Advanced Encryption System (AES) 222
7.4 Exercises and Problems 235
8 Block Cipher Modes of Operation for Confidentiality 247
8.1 Introduction 247
8.2 ECB Mode of Operation 249
8.3 CBC Modes of Operation 250
8.4 OFB Mode of Operation 253
8.5 CTR Mode of Operation 253
8.6 CFB Mode of Operation 255
8.7 Format-Preserving Encryption Modes of Operation 256
8.8 XTS-AES Mode of Operation 264
8.9 Comparison of Design Features of Modes for Confidentiality 269
8.10 Security of Modes of Operation for Confidentiality 269
8.11 Exercises and Problems 273
9 Block Cipher Modes of Operation for Authentication and Confidentiality 281
9.1 Introduction 281
9.2 Block Cipher Modes of Operation for Confidentiality and Authentication 282
9.3 Exercises and Problems 306
10 Introduction to Security Analysis of Block Ciphers 314
10.1 Pseudorandom Functions and Permutations 314
10.2 Security of TDEA and AES 320
10.3 Security Analysis Modes of Operation of BC for Confidentiality 322
10.4 Security Analysis of Authenticity-only Schemes 326
10.5 Generic Models for Security Analysis of Authenticated-Encryption Modes 329
10.6 Problems and Solutions 332
11 Introduction to Cryptanalysis Attacks on Symmetric Ciphers 338
11.1 Memory-Time Trade-off Attacks 339
11.2 Linear Cryptanalysis 347
11.3 Differential Cryptanalysis 360
11.4 Algebraic Cryptanalysis 366
11.5 Cube Attack 368
11.6 Other Attacks Against Stream Ciphers 372
11.7 Problems and Solutions 374
12 Public-Key Cryptosystems 381
12.1 Introduction to Public-Key Cryptosystems 381
12.2 RSA Cryptosystem 383
12.3 Finite Field-based Cryptography 394
12.4 Digital Signature Algorithm (DSA) 400
12.5 Exercises and Problems 401
13 Public-Key Cryptosystems: Elliptic Curve Cryptography 424
13.1 Introduction 424
13.2 Elliptic Curve Cryptography over Prime Field Fp 426
13.3 Elliptic Curve Cryptography over Extension Fields 431
13.4 Security of EC Cryptosystems 436
13.5 Elliptic Curve-based Algorithms 437
13.6 Exercises and Problems 451
14 Key Management 465
14.1 Key-Management-related Notions 465
14.2 Key-Generation Schemes 469
14.3 Key-Establishment Schemes 482
14.4.1 List of Problems 501
14.4.2 Solutions to Problems 503
15 Digital Certificate, Public-Key Infrastructure, TLS, and Kerberos 509
15.1 Digital Certificate: Notion and X.509 Format 509
15.2 Public-Key Infrastructure 511
15.3 Transport Layer Security (TLS 1.3) 517
15.4 Kerberos 521
15.5 Exercises and Problems 527
16 Generation of Pseudorandom and Prime Numbers for Cryptographic Applications 531
16.1 Introduction to Pseudorandom Number Generation 531
16.2 Pseudorandom Bit Generators Recommended for Cryptography 541
16.3 Prime Number Generation 549
16.4 Exercises and Problems 561
Notes 565
References 565
Appendix: Multiple Choice Questions and Answers 566
Index 580
Erscheinungsdatum | 27.02.2024 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Gewicht | 1833 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
ISBN-10 | 1-394-20748-4 / 1394207484 |
ISBN-13 | 978-1-394-20748-0 / 9781394207480 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich