Cryptanalysis of number theoretic ciphers:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boca Raton [u.a.]
Chapman & Hall/CRC
2003
|
Schriftenreihe: | Computational mathematics series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 318 S. |
ISBN: | 1584881534 |
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV014758311 | ||
003 | DE-604 | ||
005 | 20030520 | ||
007 | t | ||
008 | 020925s2003 xxu |||| 00||| eng d | ||
010 | |a 2002034919 | ||
020 | |a 1584881534 |9 1-58488-153-4 | ||
035 | |a (OCoLC)50638816 | ||
035 | |a (DE-599)BVBBV014758311 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-29T |a DE-91G |a DE-19 |a DE-188 |a DE-739 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 21 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a MAT 109f |2 stub | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Wagstaff, Samuel S. |d 1945- |e Verfasser |0 (DE-588)117726672 |4 aut | |
245 | 1 | 0 | |a Cryptanalysis of number theoretic ciphers |c Samuel S. Wagstaff, Jr |
264 | 1 | |a Boca Raton [u.a.] |b Chapman & Hall/CRC |c 2003 | |
300 | |a XV, 318 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Computational mathematics series | |
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Number theory | |
650 | 0 | 7 | |a Zahlentheorie |0 (DE-588)4067277-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Algorithmus |0 (DE-588)4001183-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Zahlentheorie |0 (DE-588)4067277-3 |D s |
689 | 0 | 2 | |a Algorithmus |0 (DE-588)4001183-5 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m GBV Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009994134&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-009994134 |
Datensatz im Suchindex
_version_ | 1804129483290050560 |
---|---|
adam_text | C O M P U T A T I O N A L M A T H E M A T I C S S E R I E S
CRYPTANALYSIS OF NUMBER THEORETIC CIPHERS SAMUEL S. WAGSTAFF, JR.
CHAPMAN & HALL/CRC A CRC PRESS COMPANY BOCA RATON LONDON NEW YORK
WASHINGTON, D.C. CONTENTS MATHEMATICAL FOUNDATIONS OF CRYPTANALYSIS 1
TERMINOLOGY OF CRYPTOGRAPHY 3 1.1 NOTATION 3 1.2 TYPES OF ATTACKS 4 1.3
PUBLIC KEY CIPHERS 6 1.4 BLOCK AND STREAM CIPHERS 7 1.5 PROTOCOLS 10 1.6
EXERCISES 10 PROBABILITY THEORY 13 2.1 DEFINITIONS 13 2.2 THE BIRTHDAY
PROBLEM 15 2.3 RANDOM VARIABLES 20 2.4 EXERCISES 24 DIVISIBILITY AND
ARITHMETIC 27 3.1 DIVISIBILITY 27 3.2 ARITHMETIC WITH LARGE INTEGERS 28
3.3 GREATEST COMMON DIVISORS AND THE EUCLIDEAN ALGORITHM ... 36 3.4
EXERCISES 42 PRIMES 45 4.1 THE FUNDAMENTAL THEOREM OF ARITHMETIC 45 4.2
THE DISTRIBUTION OF PRIME NUMBERS 49 4.3 IDENTIFYING AND FINDING PRIMES
51 4.4 THE LARGEST PRIME FACTOR OF A NUMBER 54 4.5 EXERCISES 59
CONGRUENCES 61 5.1 SIMPLE PROPERTIES OF CONGRUENCES 61 5.2 LINEAR
CONGRUENCES 64 5.3 THE CHINESE REMAINDER THEOREM 69 5.4 EXERCISES 72 XI
XII CONTENTS 6 EULER S THEOREM AND ITS CONSEQUENCES 75 6.1 FERMAT S
LITTLE THEOREM 75 6.2 EULER S THEOREM 79 6.3 PRIMITIVE ROOTS 86 6.4
DISCRETE LOGARITHMS 89 6.5 EXERCISES 91 7 SECOND DEGREE CONGRUENCES 93
7.1 THE LEGENDRE SYMBOL 94 7.2 THE LAW OF QUADRATIC RECIPROCITY 98 7.3
THE JACOBI SYMBOL 100 7.4 EULER PSEUDOPRIMES 103 7.5 SOLVING QUADRATIC
CONGRUENCES MODULO M 104 7.6 EXERCISES 110 8 INFORMATION THEORY 111 8.1
ENTROPY ILL 8.2 PERFECT SECRECY 114 8.3 UNICITY DISTANCE 115 8.4 SOME
OBSOLETE CIPHERS 117 8.5 THE ENTROPY OF NUMBER THEORETIC CIPHERS 121 8.6
EXERCISES 122 9 GROUPS, RINGS AND FIELDS 125 9.1 GROUPS 125 9.2 SIMPLE
PROPERTIES OF GROUPS 127 9.3 THE BABY-STEP-GIANT-STEP ALGORITHM 130 9.4
RINGS AND FIELDS 132 9.5 POLYNOMIALS 133 9.6 ALGEBRAIC NUMBER THEORY 137
9.7 EXERCISES 140 10 EXPONENTIAL METHODS OF FACTORING INTEGERS 143 10.1
FERMAT S DIFFERENCE OF SQUARES METHOD 143 10.2 POLLARD S RHO METHOD 146
10.3 POLLARD S P - 1 METHOD 149 10.4 SQUARE FORM FACTORIZATION 151 10.5
EXERCISES 153 11 FINDING LARGE PRIMES 155 11.1 STRONGER PROBABLE PRIME
TESTS 156 11.2 LUCAS PROBABLE PRIME TESTS 160 11.3 RIGOROUS PROOF OF
PRIMALITY 165 11.4 PRIME PROOFS FOR ARBITRARY LARGE INTEGERS 169 11.5
EXERCISES 169 CONTENTS XIII 12 ELLIPTIC CURVES 171 12.1 DEFINITIONS AND
EXAMPLES 171 12.2 FACTORING WITH ELLIPTIC CURVES 176 12.3 PRIMALITY
PROVING WITH ELLIPTIC CURVES 181 12.4 EXERCISES 182 13 SUBEXPONENTIAL
FACTORING ALGORITHMS 185 13.1 FACTORING WITH CONTINUED FRACTIONS 185
13.2 THE QUADRATIC SIEVE 190 13.3 VARIATIONS OF THE QUADRATIC SIEVE 193
13.3.1 LARGE PRIMES 193 13.3.2 MULTIPLE POLYNOMIALS 194 13.3.3 THE
SELF-INITIALIZING QUADRATIC SIEVE 195 13.4 THE NUMBER FIELD SIEVE 196
13.5 EXERCISES 201 14 COMPUTING DISCRETE LOGARITHMS 203 14.1 SHANKS
BABY-STEP-GIANT-STEP METHOD 204 14.2 POLLARD S METHODS 204 14.2.1 THE
RHO METHOD FOR DISCRETE LOGARITHMS 204 14.2.2 THE LAMBDA METHOD FOR
DISCRETE LOGARITHMS 205 14.3 DISCRETE LOGARITHMS VIA INDEX CALCULUS 206
14.4 OTHER FAST METHODS FOR THE GROUP R M 207 14.5 EXERCISES 210 15
RANDOM NUMBER GENERATION 211 15.1 LINEAR FEEDBACK SHIFT REGISTERS 212
15.2 A QUADRATIC RESIDUE RANDOM NUMBER GENERATOR 215 15.3 HASH FUNCTIONS
216 15.4 GENERATING TRULY RANDOM NUMBERS 217 15.5 EXERCISES 218 II THE
CRYPTOGRAPHIC ALGORITHMS 219 16 PRIVATE KEY CIPHERS 221 16.1 RIJNDAEL,
THE ADVANCED ENCRYPTION STANDARD 221 16.1.1 BYTE ARITHMETIC IN RIJNDAEL
222 16.1.2 WORD ARITHMETIC IN RIJNDAEL 224 16.1.3 THE STRUCTURE OF
RIJNDAEL 225 16.1.4 THE KEY SCHEDULE OF RIJNDAEL 227, 16.1.5 SUMMARY OF
RIJNDAEL 227 16.2 THE POHLIG-HELLMAN CIPHER 228 16.3 ELLIPTIC CURVE
POHLIG-HELLMAN 228 16.4 EXERCISES 230 XIV CONTENTS 17 PUBLIC KEY CIPHERS
231 17.1 RIVEST-SHAMIR-ADLEMAN 231 17.2 MASSEY-OMURA 232 17.3 ELLIPTIC
CURVE MASSEY-OMURA 233 17.4 ELGAMAL 233 17.5 ELLIPTIC CURVE ELGAMAL 234
17.6 RABIN-WILLIAMS 235 17.7 EXERCISES 237 18 SIGNATURE ALGORITHMS 239
18.1 RIVEST-SHAMIR-ADLEMAN SIGNATURES 239 18.2 ELGAMAL SIGNATURES 240
18.3 RABIN-WILLIAMS SIGNATURES 241 18.4 THE DIGITAL SIGNATURE ALGORITHM
242 18.5 EXERCISES 244 19 KEY EXCHANGE ALGORITHMS 245 19.1 KEY EXCHANGE
USING A TRUSTED SERVER 245 19.2 THE DIFFIE-HELLMAN KEY EXCHANGE 248 19.3
THE X.509 KEY EXCHANGE 249 19.4 EXERCISES 251 20 SIMPLE PROTOCOLS 253
20.1 BIT COMMITMENT 253 20.2 MENTAL POKER 253 20.3 OBLIVIOUS TRANSFER
255 20.4 ZERO-KNOWLEDGE PROOFS 256 20.5 METHODS OF SHARING SECRETS 258
20.5.1 SECRET SPLITTING 258 20.5.2 THE LAGRANGE INTERPOLATING POLYNOMIAL
SCHEME . . . . 258 20.5.3 THE ASMUTH AND BLOOM THRESHOLD SCHEME 260 20.6
BLIND SIGNATURES 261 20.7 EXERCISES 261 21 COMPLICATED PROTOCOLS 263
21.1 CONTRACT SIGNING 263 21.2 SECURE ELECTIONS 265 21.3 ELECTRONIC CASH
268 21.3.1 ELECTRONIC CASH ACCORDING TO CHAUM 268 21.3.2 ELECTRONIC CASH
ACCORDING TO BRANDS 271 21.4 EXERCISES 274 CONTENTS XV 22 COMPLETE
SYSTEMS 275 22.1 KERBEROS 275 22.2 PRETTY GOOD PRIVACY 277 22.3
EXERCISES 278 III METHODS OF ATTACK 279 23 DIRECT ATTACKS 281 23.1 TRY
ALL KEYS 281 23.2 FACTOR A LARGE INTEGER 283 23.3 SOLVE A DISCRETE
LOGARITHM PROBLEM 284 23.4 TIMING ATTACKS 286 23.5 EXERCISES 287 24
EXPLOITING AN ERROR 289 24.1 KEY MANAGEMENT 289 24.2 REUSE OF A KEY 290
24.3 BAD PARAMETER CHOICE 291 24.4 PARTIAL KEY EXPOSURE 293 24.5
COMPUTER FAILURE 293 24.6 EXERCISES 294 25 ACTIVE ATTACKS 297 25.1 FORCE
A USER TO MAKE A MISTAKE 297 25.2 MAN-IN-THE-MIDDLE ATTACKS 298 25.3
BIRTHDAY ATTACKS 300 25.4 SUBLIMINAL CHANNELS 300 25.5 EXERCISES 301
REFERENCES 303 INDEX 311
|
any_adam_object | 1 |
author | Wagstaff, Samuel S. 1945- |
author_GND | (DE-588)117726672 |
author_facet | Wagstaff, Samuel S. 1945- |
author_role | aut |
author_sort | Wagstaff, Samuel S. 1945- |
author_variant | s s w ss ssw |
building | Verbundindex |
bvnumber | BV014758311 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | MAT 109f DAT 465f |
ctrlnum | (OCoLC)50638816 (DE-599)BVBBV014758311 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01738nam a2200481zc 4500</leader><controlfield tag="001">BV014758311</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20030520 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">020925s2003 xxu |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2002034919</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1584881534</subfield><subfield code="9">1-58488-153-4</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)50638816</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV014758311</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">MAT 109f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wagstaff, Samuel S.</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)117726672</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptanalysis of number theoretic ciphers</subfield><subfield code="c">Samuel S. Wagstaff, Jr</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton [u.a.]</subfield><subfield code="b">Chapman & Hall/CRC</subfield><subfield code="c">2003</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 318 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Computational mathematics series</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Number theory</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Zahlentheorie</subfield><subfield code="0">(DE-588)4067277-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Algorithmus</subfield><subfield code="0">(DE-588)4001183-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Zahlentheorie</subfield><subfield code="0">(DE-588)4067277-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Algorithmus</subfield><subfield code="0">(DE-588)4001183-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">GBV Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009994134&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009994134</subfield></datafield></record></collection> |
id | DE-604.BV014758311 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T19:05:51Z |
institution | BVB |
isbn | 1584881534 |
language | English |
lccn | 2002034919 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009994134 |
oclc_num | 50638816 |
open_access_boolean | |
owner | DE-29T DE-91G DE-BY-TUM DE-19 DE-BY-UBM DE-188 DE-739 |
owner_facet | DE-29T DE-91G DE-BY-TUM DE-19 DE-BY-UBM DE-188 DE-739 |
physical | XV, 318 S. |
publishDate | 2003 |
publishDateSearch | 2003 |
publishDateSort | 2003 |
publisher | Chapman & Hall/CRC |
record_format | marc |
series2 | Computational mathematics series |
spelling | Wagstaff, Samuel S. 1945- Verfasser (DE-588)117726672 aut Cryptanalysis of number theoretic ciphers Samuel S. Wagstaff, Jr Boca Raton [u.a.] Chapman & Hall/CRC 2003 XV, 318 S. txt rdacontent n rdamedia nc rdacarrier Computational mathematics series Computer security Cryptography Number theory Zahlentheorie (DE-588)4067277-3 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Algorithmus (DE-588)4001183-5 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Zahlentheorie (DE-588)4067277-3 s Algorithmus (DE-588)4001183-5 s DE-604 GBV Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009994134&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Wagstaff, Samuel S. 1945- Cryptanalysis of number theoretic ciphers Computer security Cryptography Number theory Zahlentheorie (DE-588)4067277-3 gnd Kryptologie (DE-588)4033329-2 gnd Algorithmus (DE-588)4001183-5 gnd |
subject_GND | (DE-588)4067277-3 (DE-588)4033329-2 (DE-588)4001183-5 |
title | Cryptanalysis of number theoretic ciphers |
title_auth | Cryptanalysis of number theoretic ciphers |
title_exact_search | Cryptanalysis of number theoretic ciphers |
title_full | Cryptanalysis of number theoretic ciphers Samuel S. Wagstaff, Jr |
title_fullStr | Cryptanalysis of number theoretic ciphers Samuel S. Wagstaff, Jr |
title_full_unstemmed | Cryptanalysis of number theoretic ciphers Samuel S. Wagstaff, Jr |
title_short | Cryptanalysis of number theoretic ciphers |
title_sort | cryptanalysis of number theoretic ciphers |
topic | Computer security Cryptography Number theory Zahlentheorie (DE-588)4067277-3 gnd Kryptologie (DE-588)4033329-2 gnd Algorithmus (DE-588)4001183-5 gnd |
topic_facet | Computer security Cryptography Number theory Zahlentheorie Kryptologie Algorithmus |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=009994134&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT wagstaffsamuels cryptanalysisofnumbertheoreticciphers |