Introduction to Cryptography

 
 
CRC Press
  • erschienen am 4. September 2018
  • |
  • 268 Seiten
 
E-Book | ePUB mit Adobe DRM | Systemvoraussetzungen
978-1-351-62813-6 (ISBN)
 
Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.
  • Englisch
  • Milton
  • |
  • Großbritannien
Taylor & Francis Ltd
  • Für höhere Schule und Studium
19 schwarz-weiße und 4 farbige Abbildungen, 1 schwarz-weiße Fotos, 18 schwarz-weiße und 4 farbige Zeichnungen, 18 schwarz-weiße Tabellen
  • 5,50 MB
978-1-351-62813-6 (9781351628136)
weitere Ausgaben werden ermittelt

Sahadeo Padhye has a doctorate in Cryptography, and currently working as Associate Professor at Department of Mathematics, Motilal Nehru National Institute of Technology Allahabad, India. His research interests include Public key Cryptography, Elliptic Curve Cryptography, Digital Signatures, Lattice Based Cryptography. He has published many research papers in reputed international journals and conferences in Cryptography.

Rajeev A Sahu has a doctorate in Cryptography and currently working as a Post-Doctoral Researcher at Université Libre de Bruxelles, Belgium. He has also worked as an Assistant Professor at C.R. Rao Advanced Institute of Mathematics Statistics & Computer Science, Hyderabad, India. His research interests are Identity-Based Cryptography, Elliptic Curve Cryptography, Digital Signature, Searchable Encryption, Post-Quantum Cryptography on which he has published over two dozen research papers in reputed international journals and conferences in Computer Science and Cryptography.

Vishal Saraswat received his Ph.D. in Cryptography from University of Minnesota, Minneapolis, USA and has held regular and visiting positions at a variety of institutions, including IIT Jammu, IIT Hyderabad, ISI Kolkata, Univ. of Hyderabad and AIMSCS, Hyderabad. His research interests include anonymity and privacy, searchable encryption, postquantum crypto, and active and passive cryptanalysis, topics on which he has published several papers in reputed international journals and conferences.

Preface

Overview of Cryptography

Introduction

Goals of Cryptography

Classification of Cryptosystem

Practically Useful Cryptosystem

Cryptanalysis

Basic Algebra

Group

Ring

Field

Exercise

Number Theory

Introduction

Prime Numbers

Cardinality of Primes

Extended Euclidean Algorithm

Primality Testing

Factorization and Algorithms for it

Congruences

Quadratic Congruence

Exponentiation and Logarithm

Discrete Logarithm Problem and Algorithms for it

Exercise

Probability and Perfect Secrecy

Basic Concept of Probability

Birthday Paradox

Perfect Secrecy

Vernam One Time Pad

Random Number Generation

Pseudo-random Number Generator

Exercise

Complexity Theory

Running Time and Size of Input

Big-O Notation

Types of algorithm

Complexity Classes

Exercise

Classical Cryptosystems

Classification of Classical Cryptosystem

Block Cipher

Stream Cipher

Cryptanalysis of Cryptosystems

Exercise

Block Ciphers

Introduction

Modes of Operation

Padding

Design Considerations

Data Encryption Standard

Advanced Encryption Standard

Exercise

Hash Function

Compression and Hash Functions

Hash function for cryptography

Random Oracle Model

Cryptographic Hash Functions

Exercise

Public Key Cryptosystem

Introduction

Diffie-Hellman Key Exchange Protocol

RSA Cryptosystem

Rabin Cryptosystem

ElGamal Cryptosystem

Elliptic Curve Cryptosystem

Exercises

Digital Signature

Formal Definitions

Attack Goals for Digital Signature

Digital Signature in Practice

Some Popular Digital Signatures

Exercises

Research Directions in Cryptography

Pairing-Based Cryptography

Zero-knowledge Proof System

Authenticated Group Key Exchange

Attribute-Based Cryptography

Homomorphic Encryption

Secure Multi-party Computation

Secret Sharing

Post-Quantum Cryptography

Side-Channel Analysis

References

Index

Dateiformat: EPUB
Kopierschutz: Adobe-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Installieren Sie bereits vor dem Download die kostenlose Software Adobe Digital Editions (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nicht Kindle)

Das Dateiformat EPUB ist sehr gut für Romane und Sachbücher geeignet - also für "fließenden" Text ohne komplexes Layout. Bei E-Readern oder Smartphones passt sich der Zeilen- und Seitenumbruch automatisch den kleinen Displays an. Mit Adobe-DRM wird hier ein "harter" Kopierschutz verwendet. Wenn die notwendigen Voraussetzungen nicht vorliegen, können Sie das E-Book leider nicht öffnen. Daher müssen Sie bereits vor dem Download Ihre Lese-Hardware vorbereiten.

Bitte beachten Sie bei der Verwendung der Lese-Software Adobe Digital Editions: wir empfehlen Ihnen unbedingt nach Installation der Lese-Software diese mit Ihrer persönlichen Adobe-ID zu autorisieren!

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

51,99 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
ePUB mit Adobe DRM
siehe Systemvoraussetzungen
E-Book bestellen