外文科技图书简介
当前位置:首页 > 检索结果 >文献详细内容

书名:A cryptography primer

责任者:Philip N. Klein  |  Brown University  |  Providence  |  Rhode Island.

ISBN\ISSN:9781107017887,1107017882,9781107603455,1107603455 

出版时间:2014

出版社:Cambridge University Press

分类号:自动化技术、计算机技术


摘要

Cryptography has been employed in war and diplomacy from the time of Julius Caesar. In our Internet age, cryptography's most widespread application may be for commerce, from protecting the security of electronic transfers to guarding communication from industrial espionage. This accessible introduction for undergraduates explains the cryptographic protocols for achieving privacy of communication and the use of digital signatures for certifying the validity, integrity, and origin of a message, document, or program. Rather than offering a how-to on configuring web browsers and e-mail programs, the author provides a guide to the principles and elementary mathematics underlying modern cryptography, giving readers a look under the hood for security techniques and the reasons they are thought to be secure.

查看更多

目录

Preface page ix

Acknowledgments xiii

1 Introduction 1

1.1 Encryption and decryption

1.2 Channels, secure and insecure 2

1.3 Security through obscurity 5

1.4 The alternative: The Kerckhoffs Doctrine 6

1.5 A taxonomy of cryptography 7

1.6 Attacks on cryptosystems 9

1.7 Problems 11

2 Modular Arithmetic 12

2.1 The Caesar cypher 12

2.2 The number circle 13

2.3 Modular arithmetic in daily life 13

2.4 Congruences 14

2.5 Another example: Congruences modulo 10 15

2.6 Substituting using congruences 16

2.7 Representatives and remainder 20

2.8 Problems 23

3 The Addition Cypher, an Insecure Block Cypher 26

3.1 The addition cypher 27

3.2 Block cyphers 27

3.3 Attacks on the addition cypher 29

3.4 Attacks on any block cypher that uses ECB mode 31

3.5 Problems 31

4 Functions 32

4.1 η1e basics 32

4.2 lnvertibility 34

4.3 Functions from modular arithmetic 37

4.4 Function notation 40

4.5 Uses of functions 41

4.6 A two-input function: The encryption function for the generalized Caesar cypher 42

4.7 Specialization:Turning a two-input function into a one-input function 43

4.8 Problems 44

5 Probability Theory 49

5.1 Outcomes of an experiment 49

5.2 Probabilities of outcomes 49

5.3 Plotting a probability distribution 50

5.4 Probabilities of sets of outcomes 51

5.5 Summary so far 51

5.6 Uniform distributions 52

5.7 Random variables 53

5.8 Problems 56

6 Perfect Secrecy and Perfectly Secure Cryptosystems 62

6.1 What does an eavesdropper learn from seeing a cyphertext? 62

6.2 Evaluation of cryptosystems 65

6.3 Perfect secrecy versus unique decryptability 70

6.4 A brief history of perfect secrecy 70

6.5 The drawback of perfectly secret cryptosystems 73

6.6 Problems 74

7 Number Theory 82

7.1 Divisibility 82

7.2 Relative primality 82

7.3 Prime numbers 83

7.4 Prime factorization 83

7.5 Euler's phi function cp(x) 84

7.6 Exponentiation 85

7.7 Euler's Theorem 86

7.8 Problems 86

8 Euclid'S Algorithm 89

8.1 The measuring puzzle 89

8.2 Finding a modular multipl icative inverse by solving a measuring puzzle 91

8.3 Euclid 's algorithm 93

8.4 The backward part of Euclid's algorithm 96

8.5 The EuclidCards 98

8.6 What Euclid's algorithm teaches us 103

8.7 Problems 104

9 Some Uses of Perfect Secrecy 106

9.1 Secret-sharing and perfect secrecy 106

9.2 Threshold secret-sharing 107

9.3 Message authent ication codes 111

9.4 Problems 112

10 Computational Problems, Easy and Hard 118

10.1 Computational problems 118

10.2 Algorithms 119

10.3 Predicting how many computer steps are needed by an algorithm 121

10.4 Fast algorithms and slow algorith ms, easy problems and hard problems 122

10.5 Problem s 123

11 Modular Exponentiation , Modular Logarithm, and One-Way Functions 129

11.1 Modular logarithms 129

11.2 Application of one-way functions to password security 133

11.3 Application of one-way functions to logging in: s/key 135

11.4 (Mis) application of one-way functions to commitment 137

11.5 Problems 140

12 Diffie and Hellman 's Exponential-Key-Agreement Protocol 143

12.1 Motivation 143

12.2 Background 143

12.3 The protocol 144

12.4 Security 145

12.5 Eve in the middle 145

12.6 Problems 146

13 Computationally Secure Single-Key Cryptosystems 147

13.1 Secure block cyphers in the real world 147

13.2 Cypher block chaining 148

13.3 The exponentiation cypher 150

13.4 How to find a big prime 152

13.5 Problems 153

14 Public-Key Cryptosystems and Digital Signatures 157

14.1 Public-key cryptosystems 157

14.2 El Gamal 'scryptosystem 158

14.3 More remarks about the El Gamal cryptosystem 159

14.4 Public-key cryptography in practice 160

14.5 Signatures 161

14.6 Trapdoor one-way functions and their use in public-key encryption and digital signatures 162

14.7 The RSA trapdoor one-way function 163

14.8 The RSA public-key cryptosystem 163

14.9 The RSA digital signature scheme 163

14.10 Message digest functions 164

14.11 Use of message digest functions in commitment 165

14.12 Problems 165

Further Reading 171

Index 173

查看PDF
查看更多

馆藏单位

中科院文献情报中心