Cryptography: theory and practice
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
Chapman & Hall [u.a.]
2002
|
Ausgabe: | 2. ed. |
Schriftenreihe: | CRC Press series on discrete mathematics and its applications
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | 339 S. graph. Darst. |
ISBN: | 1584882069 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV013964280 | ||
003 | DE-604 | ||
005 | 20030124 | ||
007 | t | ||
008 | 011018s2002 xxud||| |||| 00||| eng d | ||
020 | |a 1584882069 |9 1-58488-206-9 | ||
035 | |a (OCoLC)248929028 | ||
035 | |a (DE-599)BVBBV013964280 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
044 | |a xxu |c XD-US | ||
049 | |a DE-739 |a DE-20 |a DE-824 |a DE-91G |a DE-Aug4 |a DE-1051 |a DE-521 |a DE-634 |a DE-83 |a DE-11 |a DE-188 |a DE-19 | ||
050 | 0 | |a QA268.S75 2002 | |
082 | 0 | |a 005.8/2 21 | |
082 | 0 | |a 005.82 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 273 |0 (DE-625)143640: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a 94A60 |2 msc | ||
100 | 1 | |a Stinson, Douglas R. |d 1956- |e Verfasser |0 (DE-588)124658814 |4 aut | |
245 | 1 | 0 | |a Cryptography |b theory and practice |c Douglas R. Stinson |
250 | |a 2. ed. | ||
264 | 1 | |a Boca Raton [u.a.] |b Chapman & Hall [u.a.] |c 2002 | |
300 | |a 339 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a CRC Press series on discrete mathematics and its applications | |
650 | 4 | |a Coding theory | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Geheimschrift |0 (DE-588)4156317-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Geheimschrift |0 (DE-588)4156317-7 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009557339&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009557339 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804128814290173952 |
---|---|
adam_text | Titel: Cryptography
Autor: Stinson, Douglas R
Jahr: 2002
Contents
1 Classical Cryptography 1
1.1 Introduction: Some Simple Cryptosystems..............1
1.1.1 The Shift Cipher................................3
1.1.2 The Substitution Cipher........................7
1.1.3 The Affine Cipher ..............................8
1.1.4 The Vigenere Cipher............................12
1.1.5 The Hill Cipher ... ...........................13
1.1.6 The Permutation Cipher . .....................18
1.1.7 Stream Ciphers..................................20
1.2 Cryptanalysis............................................25
1.2.1 Cryptanalysis of the Affine Cipher..............27
1.2.2 Cryptanalysis of the Substitution Cipher . ... 28
1.2.3 Cryptanalysis of the Vigenere Cipher..........31
1.2.4 Cryptanalysis of the Hill Cipher................34
1.2.5 Cryptanalysis of the LFSR Stream Cipher ... 36
1.3 Notes ......................... • 38
Exercises ......................................................38
2 Shannon s Theory 45
2.1 Introduction..............................................45
2.2 Elementary Probability Theory..........................46
2.3 Perfect Secrecy..........................................48
2.4 Entropy............................................34
2.4.1 Huffman Encodings ............................56
2.5 Properties of Entropy....................................59
2.6 Spurious Keys and Unicity Distance....................62
2.7 Product Cryptosystems..................................67
2.8 Notes ....................................................20
Exercises .....................................20
73
73
74
79
80
82
Block Ciphers and the Advanced Encryption Standard
3.1 Introduction.......................
3.2 Substitution-Permutation Networks...........
3.3 Linear Cryptanalysis..................
3.3.1 The Piling-up Lemma .............
3.3.2 Linear Approximations of S-boxes.......
3 3 3 A Linear Attack on an SPN ....................85
QQ
3.4 Differential Cryptanalysis................
3.5 The Data Encryption Standard..........................95
3.5.1 Description of DES..............................92
3.5.2 Analysis of DES................
3.6 The Advanced Encryption Standard....................102
3.6.1 Description of AES...............
3.6.2 Analysis of AES................................108
3.7 Modes of Operation......................................109
3.8 Notes and References....................................H2
Exercises ......................................................H8
Cryptographic Hash Functions 117
4.1 Hash Functions and Data Integrity......................117
4.2 Security of Hash Functions..............................119
4.2.1 The Random Oracle Model......................120
4.2.2 Algorithms in the Random Oracle Model ... 121
4.2.3 Comparison of Security Criteria................125
4.3 Iterated Hash Functions..................................127
4.3.1 The Merkle-Damgard Construction............128
4.3.2 The Secure Hash Algorithm....................133
4.4 Message Authentication Codes..........................136
4.4.1 Nested MACs and HMAC.................138
4.4.2 CBC-MAC......................................140
4.5 Unconditionally Secure MACs..........................141
4.5.1 Strongly Universal Hash Families..............144
4.5.2 Optimality of Deception Probabilities..........146
4.6 Notes and References....................................149
Exercises ......................................................150
The RSA Cryptosystem and Factoring Integers 155
5.1 Introduction to Public-key Cryptography................155
5.2 More Number Theory....................................157
5.2.1 The Euclidean Algorithm........................157
5.2.2 The Chinese Remainder Theorem..............162
5.2.3 Other Useful Facts..............................164
5.3 The RSA Cryptosystem..................................167
5.3.1 Implementing RSA..............................168
5.4 Primality Testing........................................171
5.5 Square Roots Modulo n..................................181
5.6 Factoring Algorithms....................................182
5.6.1 The Pollard p — 1 Algorithm....................182
5.6.2 The Pollard Rho Algorithm....................184
5.6.3 Dixon s Random Squares Algorithm............187
5.6.4 Factoring Algorithms in Practice................192
5.7 Other Attacks on RSA ..................................194
5.7.1 Computing f (n)................................194
5.7.2 The Decryption Exponent......................195
5.7.3 Wiener s Low Decryption Exponent Attack . . 200
5.8 The Rabin Cryptosystem................................204
5.8.1 Security of the Rabin Cryptosystem............206
5.9 Semantic Security of RSA..............................208
5.9.1 Partial Information Concerning Plaintext Bits . 209
5.9.2 Optimal Asymmetric Encryption Padding . . . 212
5.10 Notes and References....................................218
Exercises ......................................................219
6 Public-key Cryptosystems Based on the Discrete Logarithm
Problem 226
6.1 The ElGamal Cryptosystem..............................226
6.2 Algorithms for the Discrete Logarithm Problem .... 228
6.2.1 Shanks Algorithm..............................229
6.2.2 The Pollard Rho Discrete Logarithm Algorithm 231
6.2.3 The Pohlig-Hellman Algorithm................234
6.2.4 The Index Calculus Method....................237
6.3 Lower Bounds on the Complexity of Generic Algorithms 239
6.4 Finite Fields..............................................243
6.5 Elliptic Curves ..........................................247
6.5.1 Elliptic Curves over the Reals..................247
6.5.2 Elliptic Curves Modulo a Prime................250
6.5.3 Properties of Elliptic Curves....................254
6.5.4 Point Compression and the ECIES..............255
6.5.5 Computing Point Multiples on Elliptic Curves . 257
6.6 Discrete Logarithm Algorithms in Practice..............259
6.7 Security of ElGamal Systems............................261
6.7.1 Bit Security of Discrete Logarithms............261
6.7.2 Semantic Security of ElGamal Systems .... 264
6.7.3 The Diffie-Hellman Problems..................265
6.8 Notes and References....................................267
Exercises ......................................................268
7 Signature Schemes
7.1 Introduction..............................................274
7.2 Security Requirements for Signature Schemes..........277
7.2.1 Signatures and Hash Functions..................279
7.3 The ElGamal Signature Scheme........................280
7.3.1 Security of the ElGamal Signature Scheme . . 282
7.4 Variants of the ElGamal Signature Scheme..............286
7.4.1 The Schnorr Signature Scheme..................286
7.4.2 The Digital Signature Algorithm................288
7.4.3 The Elliptic Curve DSA........................291
7.5 Provably Secure Signature Schemes....................292
7.5.1 One-time Signatures............................292
7.5.2 Full Domain Hash..............................297
7.6 Undeniable Signatures..................................300
7.7 Fail-stop Signatures......................................305
7.8 Notes and References....................................310
Exercises ......................................................311
Further Reading 315
Bibliography 317
Cryptosystem Index 331
Algorithm Index 333
Problem Index 334
Subject Index 335
|
any_adam_object | 1 |
author | Stinson, Douglas R. 1956- |
author_GND | (DE-588)124658814 |
author_facet | Stinson, Douglas R. 1956- |
author_role | aut |
author_sort | Stinson, Douglas R. 1956- |
author_variant | d r s dr drs |
building | Verbundindex |
bvnumber | BV013964280 |
callnumber-first | Q - Science |
callnumber-label | QA268 |
callnumber-raw | QA268.S75 2002 |
callnumber-search | QA268.S75 2002 |
callnumber-sort | QA 3268 S75 42002 |
callnumber-subject | QA - Mathematics |
classification_rvk | SK 170 ST 273 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)248929028 (DE-599)BVBBV013964280 |
dewey-full | 005.8/221 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 21 005.82 |
dewey-search | 005.8/2 21 005.82 |
dewey-sort | 15.8 12 221 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01907nam a2200505 c 4500</leader><controlfield tag="001">BV013964280</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030124 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">011018s2002 xxud||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1584882069</subfield><subfield code="9">1-58488-206-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)248929028</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013964280</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">XD-US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-1051</subfield><subfield code="a">DE-521</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA268.S75 2002</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2 21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 273</subfield><subfield code="0">(DE-625)143640:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">94A60</subfield><subfield code="2">msc</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Stinson, Douglas R.</subfield><subfield code="d">1956-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)124658814</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography</subfield><subfield code="b">theory and practice</subfield><subfield code="c">Douglas R. Stinson</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">Chapman & Hall [u.a.]</subfield><subfield code="c">2002</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">339 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">CRC Press series on discrete mathematics and its applications</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Coding theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geheimschrift</subfield><subfield code="0">(DE-588)4156317-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Geheimschrift</subfield><subfield code="0">(DE-588)4156317-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009557339&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009557339</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV013964280 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:55:13Z |
institution | BVB |
isbn | 1584882069 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009557339 |
oclc_num | 248929028 |
open_access_boolean | |
owner | DE-739 DE-20 DE-824 DE-91G DE-BY-TUM DE-Aug4 DE-1051 DE-521 DE-634 DE-83 DE-11 DE-188 DE-19 DE-BY-UBM |
owner_facet | DE-739 DE-20 DE-824 DE-91G DE-BY-TUM DE-Aug4 DE-1051 DE-521 DE-634 DE-83 DE-11 DE-188 DE-19 DE-BY-UBM |
physical | 339 S. graph. Darst. |
publishDate | 2002 |
publishDateSearch | 2002 |
publishDateSort | 2002 |
publisher | Chapman & Hall [u.a.] |
record_format | marc |
series2 | CRC Press series on discrete mathematics and its applications |
spelling | Stinson, Douglas R. 1956- Verfasser (DE-588)124658814 aut Cryptography theory and practice Douglas R. Stinson 2. ed. Boca Raton [u.a.] Chapman & Hall [u.a.] 2002 339 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier CRC Press series on discrete mathematics and its applications Coding theory Cryptography Geheimschrift (DE-588)4156317-7 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Geheimschrift (DE-588)4156317-7 s 1\p DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009557339&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Stinson, Douglas R. 1956- Cryptography theory and practice Coding theory Cryptography Geheimschrift (DE-588)4156317-7 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4156317-7 (DE-588)4033329-2 |
title | Cryptography theory and practice |
title_auth | Cryptography theory and practice |
title_exact_search | Cryptography theory and practice |
title_full | Cryptography theory and practice Douglas R. Stinson |
title_fullStr | Cryptography theory and practice Douglas R. Stinson |
title_full_unstemmed | Cryptography theory and practice Douglas R. Stinson |
title_short | Cryptography |
title_sort | cryptography theory and practice |
title_sub | theory and practice |
topic | Coding theory Cryptography Geheimschrift (DE-588)4156317-7 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Coding theory Cryptography Geheimschrift Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009557339&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT stinsondouglasr cryptographytheoryandpractice |