Cryptography

Cryptography: Theory and Practice, Third Edition

Series:
Published:
Content:
Author(s):
Free Standard Shipping

Purchasing Options

Hardback
$73.95
ISBN 9781584885085
Cat# C5084
Add to cart
eBook (VitalSource)
$73.95 $51.77
ISBN 9781420057133
Cat# CE084
Add to cart
SAVE 30%
eBook Rentals
 

Features

  • Provides comprehensive coverage along with the latest developments in cryptography
  • Covers many new practical schemes, such as Guillou-Quisquater, Okamoto, and Schnorr schemes
  • Details the various types of protocols and how party identities are verified
  • Includes digital fingerprinting schemes, multicast security, and copyright protection issues
  • Supplies rigorous analysis of cryptographic protocols for identification, key distribution, and key agreement
  • Contains numerous examples and exercises
  • Summary

    THE LEGACY…
    First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.

    WHY A THIRD EDITION?

    The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering:

  • Pseudorandom bit generation in cryptography
  • Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes
  • Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs
  • Public key infrastructure, including identity-based cryptography
  • Secret sharing schemes
  • Multicast security, including broadcast encryption and copyright protection

    THE RESULT…

    Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.
  • Table of Contents

    CLASSICAL CRYPTOGRAPHY
    Introduction: Some Simple Cryptosystems
    Cryptanalysis
    Notes
    Exercises

    SHANNON'S THEORY
    Introduction
    Elementary Probability Theory
    Perfect Secrecy
    Entropy
    Properties of Entropy
    Spurious Keys and Unicity Distance
    Product Cryptosystems
    Notes
    Exercises

    BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD
    Introduction
    Substitution-Permutation Networks
    Linear Cryptanalysis
    Differential Cryptanalysis
    The Data Encryption Standard
    The Advanced Encryption Standard
    Modes of Operation
    Notes and References
    Exercises

    CRYPTOGRAPHIC HASH FUNCTIONS
    Hash Functions and Data Integrity
    Security of Hash Functions
    Iterated Hash Functions
    Message Authentication Codes
    Unconditionally Secure MACs
    Notes and References
    Exercises

    THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS
    Introduction to Public-key Cryptography
    More Number Theory
    The RSA Cryptosystem
    Primality Testing
    Square Roots Modulo n
    Factoring Algorithms
    Other Attacks on RSA
    The Rabin Cryptosystem
    Semantic Security of RSA
    Notes and References
    Exercises

    PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS
    The ElGamal Cryptosystem
    Algorithms for the Discrete Logarithm Problem
    Lower Bounds on the Complexity of Generic Algorithms
    Finite Fields
    Elliptic Curves
    Discrete Logarithm Algorithms in Practice
    Security of ElGamal Systems
    Notes and References
    Exercises

    SIGNATURE SCHEMES
    Introduction
    Security Requirements for Signature Schemes
    The ElGamal Signature Scheme
    Variants of the ElGamal Signature Scheme
    Provably Secure Signature Schemes
    Undeniable Signatures
    Fail-stop Signatures
    Notes and References
    Exercises

    PSEUDO-RANDOM NUMBER GENERATION
    Introduction and Examples
    Indistinguishability of Probability Distributions
    The Blum-Blum-Shub Generator
    Probabilistic Encryption
    Notes and References
    Exercises

    IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION
    Introduction
    Challenge-and-Response in the Secret-Key Setting
    Challenge-and-Response in the Public-Key Setting
    The Schnorr Identification Scheme
    The Okamoto Identification Scheme
    The Guillou-Quisquater Identification Scheme
    Notes and References
    Exercises

    KEY DISTRIBUTION
    Introduction
    Diffie-Hellman Key Predistribution
    Unconditionally Secure Key Predistribution
    Key Distribution Patterns
    Session Key Distribution Schemes
    Notes and References
    Exercises

    KEY AGREEMENT SCHEMES
    Introduction
    Diffie-Hellman Key Agreement
    MTI Key Agreement Schemes
    Key Agreement Using Self-Certifying Keys
    Encrypted Key Exchange
    Conference Key Agreement Schemes
    Notes and References
    Exercises

    PUBLIC-KEY INFRASTRUCTURE
    Introduction: What is a PKI?
    Certificates
    Trust Models
    The Future of PKI?
    Identity-Based Cryptography
    Notes and References
    Exercises

    SECRET SHARING SCHEMES
    Introduction: The Shamir Threshold Scheme
    Access Structures and General Secret Sharing
    Information Rate and Construction of Efficient Schemes
    Notes and References
    Exercises

    MULTICAST SECURITY AND COPYRIGHT PROTECTION
    Introduction to Multicast Security
    Broadcast Encryption
    Multicast Re-Keying
    Copyright Protection
    Tracing Illegally Redistributed Keys
    Notes and References
    Exercises
    FURTHER READING
    BIBLIOGRAPHY
    INDEX

    Editorial Reviews

    "…Mathematical background is provided where it is needed. Each chapter finishes with a large number of exercises, varying from elementary to quite challenging. … the bibliography, which was already huge in the first edition, now contains 353 references, some of which are quite recent. … the book is very well suited for a course in cryptography."
    -Mathematical Reviews, Issue 2007f

    Recommended For You

     
     

    Related Titles

    Textbooks
    Other CRC Press Sites
    Featured Authors
    STAY CONNECTED
    Facebook Page for CRC Press Twitter Page for CRC Press You Tube Channel for CRC Press LinkedIn Page for CRC Press Google Plus Page for CRC Press
    Sign Up for Email Alerts
    © 2014 Taylor & Francis Group, LLC. All Rights Reserved. Privacy Policy | Cookie Use | Shipping Policy | Contact Us