Padhye / Sahu / Saraswat | Introduction to Cryptology | E-Book | sack.de
E-Book

E-Book, Englisch, 268 Seiten

Padhye / Sahu / Saraswat Introduction to Cryptology


1. Auflage 2018
ISBN: 978-1-351-62815-0
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)

E-Book, Englisch, 268 Seiten

ISBN: 978-1-351-62815-0
Verlag: Taylor & Francis
Format: PDF
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)



Cryptography plays a key role in ensuring data secrecy and integrity and is one of the most eminent topics of study and research in the current age. The vast majority of communications and financial transactions are happening electronically, which means that security for such communications should be given the highest attention. This book introduces mathematical notions relevant to cryptography and discusses the design and analysis of cryptographic schemes. In addition, applications on secure systems are provided, as well as a review of primitive cryptography through modern, state-of-the-art research, ending with suppositions on future research to address the open problems in the field.

Padhye / Sahu / Saraswat Introduction to Cryptology jetzt bestellen!

Weitere Infos & Material


Introduction and mathematical foundation. Overview. Information security and cryptography. Why cryptography? Cryptography basics. Classical cryptography. Roadmap. Notes and further references. Mathematical foundation of cryptography. Abstract algebra. Number theory. Finite fields. Binary field arithmetic. Probability. Complexity theory. Notes and further references. Information theory. Shannon’s theory. Entropy. Perfect secrecy. Notes and further references. Security models and security proofs. Security goals. Attack models. Provable security. Proof techniques. Notes and further references. Zero-knowledge proofs. Perfect and computational zero-knowledge. Commitment schemes. Interaction and randomness. Proofs of knowledge. Notes and further references. Traditional cryptography. Stream ciphers. Feedback shift registers. Stream ciphers based on LFSRs. Other stream ciphers. Notes and further references. Block ciphers. Feistel network – DES etc. SP network – AES etc. Modes of transfer. Notes and further references. Hash functions. Data integrity and MDC. Message authentication and MAC. Basic constructions. Attacks on hash functions. Notes and further references. Public-key encryption. Diffie-Hellman key exchange. Knapsack Cryptosystem. ElGamal public-key encryption. RSA public-key encryption. Rabin public-key encryption. Notes and further references. Digital signatures. RSA and related signature schemes. ElGamal and related signature schemes. Schnorr signature scheme. Notes and further references. Modern cryptography. Elliptic curve cryptography. Introduction to elliptic curves. Algebra of elliptic curves. Public-key encryption. Signature schemes. Pairing-based cryptography. Notes and further references. Identity-based cryptography. Introduction -- advantages & disadvantages. Id-based encryption schemes. Id-based signature schemes. Cryptographic protocols based on IBE. Notes and further references. Applications. Identification. E-cash. E-voting. Notes and further references. Recent advances. Cloud. Internet of things (IoT). Big data. Notes and further references. Cryptanalysis. Classical cryptanalysis. Frequency analysis. Randomness testing. NIST suite. Notes and further references. Cryptanalysis of symmetric ciphers. Linear analysis. Differential analysis. Notes and further references. Attacks on factoring. Trial Division. Fermat’s Method. Pollard’s Rho Method. Pollard’s p-1 algorithm. Quadratic sieve method. Notes and further references. Attacks on discrete logarithm problem. Shank’s algorithm. Pollard’s rho Algorithm. Pohlig- Hellman Algorithm. Index-calculus Method. Notes and further references. Sidechannel attacks. Timing attacks. Power attacks. Fault attacks. EMR attacks. Notes and further references.



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.