Contemporary cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Boston [u.a.]
Artech House
2011
|
Ausgabe: | 2. ed. |
Schriftenreihe: | artech house information security and privacy series
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | XXV, 571 S. |
ISBN: | 9781608071456 |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | BV039161752 | ||
003 | DE-604 | ||
005 | 20120131 | ||
007 | t | ||
008 | 110727s2011 |||| 00||| eng d | ||
010 | |a 2005043576 | ||
020 | |a 9781608071456 |9 978-1-60807-145-6 | ||
035 | |a (OCoLC)745529997 | ||
035 | |a (DE-599)BSZ341272604 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-12 |a DE-898 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a 24,1 |2 ssgn | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Oppliger, Rolf |e Verfasser |0 (DE-588)1019191988 |4 aut | |
245 | 1 | 0 | |a Contemporary cryptography |c Rolf Oppliger |
250 | |a 2. ed. | ||
264 | 1 | |a Boston [u.a.] |b Artech House |c 2011 | |
300 | |a XXV, 571 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a artech house information security and privacy series | |
500 | |a Includes bibliographical references and index | ||
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4123623-3 |a Lehrbuch |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung BSB Muenchen |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024179230&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024179230 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804148010818469888 |
---|---|
adam_text | Contents
Foreword
xv
Preface
xix
Acknowledgments
xxv
Chapter
1
Introduction
1
1.1
Cryptology
1
1.2
Cryptographic Systems
4
1.2.1
Classes of Cryptographic Systems
8
1.2.2
Secure Cryptographic Systems
8
1.2.3
Real Security of Secure Cryptosystems
15
1.3
Historical Background Information
18
1.4
Outline of the Book
20
References
22
Chapter
2
Cryptographic Systems
25
2.1
Unkeyed Cryptosystems
25
2.1.1
One-Way Functions
25
2.1.2
Cryptographic Hash Functions
27
2.1.3
Random Bit Generators
29
2.2
Secret Key Cryptosystems
31
2.2.1
Symmetric Encryption Systems
31
2.2.2
Message Authentication Codes
33
2.2.3
PRBGs
35
2.2.4
PRFs
36
2.3
Public Key Cryptosystems
37
2.3.1
Asymmetric Encryption Systems
37
2.3.2
DSSs
40
2.3.3
Key Agreement
44
2.3.4
Entity Authentication
46
VII
Contemporary Cryptography
2.3.5
Secure Multiparty Computation
46
2.4
Final Remarks
47
References
47
I UNKEYED
CRYPTOSYSTEMS
49
Chapter
3
One-Way Functions
51
3.1
Introduction
51
3.2
Candidate One-Way Functions
54
3.2.1
Discrete Exponentiation Function
55
3.2.2
RSA Function
59
3.2.3
Modular Square Function
61
3.3
Integer Factorization Algorithms
63
3.3.1
Special-Purpose Algorithms
63
3.3.2
General-Purpose Algorithms
67
3.3.3
State of the Art
69
3.4
Algorithms for Computing Discrete Logarithms
71
3.4.1
Generic Algorithms
71
3.4.2
Nongeneric (Special-Purpose) Algorithms
74
3.4.3
State of the Art
75
75
77
■ 82
83
87
87
91
93
96
101
103
105
References
109
Chapter
5
Random Bit Generators
113
5.1
Introduction
113
5.2
Realizations and Implementations
115
5.2.1
Hardware-Based Random Bit Generators
115
5.2.2
Software-Based Random Bit Generators
116
3.5
Hard-Core Predicates
3.6
Elliptic Curve Cryptography
3.7
Final Remarks
References
Chapter
4
Cryptographic Hash Functions
4.1
Introduction
4.2
Merkle-Damgård
Construction
4.3
Exemplary Cryptographic Hash Functions
4.3.1
MD4
4.3.2
MD5
4.3.3
SHA-1
4.4
Final Remarks
Contents ix
5.2.3
Deskewing Techniques
117
5.3
Statistical Randomness Testing
118
5.4
Final Remarks
120
References
120
II SECRET KEY
CRYPTOSYSTEMS
123
Chapter
6
Symmetric Encryption Systems
125
6.1
Introduction
125
6.1.1
Examples
126
6.1.2
Classes of Symmetric Encryption Systems
129
6.1.3
Secure Symmetric Encryption Systems
130
6.1.4
Evaluation Criteria
133
6.2
Block Ciphers
134
6.2.1
DES
136
6.2.2
AES
155
6.2.3
Modes of Operation
171
6.3
Stream Ciphers
181
6.3.1
LFSR-Based Stream Ciphers
182
6.3.2
Other Stream Ciphers
184
6.4
Perfectly Secure Encryption
187
6.5
Final Remarks
192
References
194
Chapter
7
Message Authentication Codes
197
7.1
Introduction
197
7.2
Computationally Secure MACs
200
7.2.1
MACs Using Symmetric Encryption Systems
201
7.2.2
MACs Using Keyed Hash Functions
203
7.2.3
MACs Using PRFs
207
7.2.4
MACs Based on Universal Hashing
211
7.3
Information-Theoretically Secure MACs
212
7.4
Final Remarks
214
References
215
Chapter
8
Pseudorandom Bit Generators
217
8.1
Introduction
217
8.2
Exemplary Constructions
219
8.3
Cryptographically Secure PRBGs
222
8.3.1
BIum-Micali PRBG
225
Contemporary Cryptography
8.3.2
RSAPRBG
225
8.3.3
BBSPRBG
226
8.4
Final Remarks
227
References
228
Chapter
9
Pseudorandom Functions
231
9.
1 introduction
231
9.2
Constructions
235
9.2.1
PRF-Based PRBG
235
9.2.2
PRBG-Based PRF
236
9.3
Random Oracle Model
237
9.4
Final Remarks
239
References
239
III PUBLIC KEY
CRYPTOSYSTEMS
241
Chapter
10
Asymmetric Encryption Systems
243
10.1
Introduction
243
10.2
Basic Systems
248
10.2.1
RSA
248
10.2.2
Rabin
260
10.2.3
Elgamal
266
1
0.3
Secure Systems
273
10.3.1
Probabilistic Encryption
273
10.3.2
Optimal Asymmetric Encryption Padding
276
10.3.3
Cramer-Shoup
281
10.4
Identity-Based Encryption
284
10.5
Homomorphic Encryption
286
10.6
Final Remarks
287
References
288
Chapter
11
Digital Signature Systems
291
11.1
Introduction
291
11.2
Basic Systems
295
11.2.1
RSA
295
11.2.2
Rabin
301
11.2.3
Elgamal
303
11.2.4 Schnorr 309
11.2.5
DSA
311
11.2.6
ECDSA
316
Contents xi
ИЗ
Provably
Secure
Systems 317
11.3.1 GMR 319
11.3.2 PSSandPSS-R 320
11.3.3 Cramer-Shoup 325
11.3.4 Gennaro-Halevi-Rabin 327
11.4
Identity-Based
Signatures
328
11.5
One-Time Signatures
329
11.6
Digital Signatures for Streams
332
11.7
Variants
336
11.7.1
Blind Signatures
336
11.7.2
Undeniable Signatures
337
11.7.3
Fail-Stop Signatures
338
11.7.4
Group Signatures
338
11.8
Final Remarks
338
References
339
Chapter
12
Key Establishment
343
12.1
Introduction
343
12.2
Key Distribution Protocols
344
12.2.1
Merkle s Puzzles
344
12.2.2
Shamir s Three-Pass Protocol
346
12.2.3
Asymmetric Encryption-Based Key Distribution
Protocol
349
12.3
Key Agreement Protocols
350
12.4
Quantum Cryptography
352
12.4.1
Basic Principles
353
12.4.2
Quantum Key Exchange Protocol
355
12.4.3
Historicai and Recent Developments
358
12.5
Final Remarks
360
References
361
Chapter
13
Entity Authentication
363
13.1
Introduction
363
13.2
Authentication Technologies
364
13.2.1
Proof by Possession
365
13.2.2
Proof by Knowledge
366
13.2.3
Proof by Property
370
13.2.4
Proof by Location
371
13.3
Zero-Knowledge Authentication Protocols
372
13.3.1
Preliminary Remarks
373
Xli
Contemporary Cryptography
13.3.2
Fiat-Shamir
374
13.3.3
Guillou-Quisquater
377
13.3.4 Schnorr 378
13.3.5
Turning Interactive Proofs of Knowledge into DSSs
379
13.4
Final Remarks
380
References
380
Chapter
14
Secure Multiparty Computation
383
14.1
Introduction
384
14.1.1
Communication Models
385
14.1.2
Adversary Models
386
14.1.3
Notions of Security
387
14.2
Major Results
387
14.3
Final Remarks
389
References
389
IV CONCLUSIONS
391
Chapter
15
Key Management
393
15.1
Introduction
393
15.2
Key Life Cycle
395
15.2.1
Key Generation
395
15.2.2
Key Distribution
395
15.2.3
Key Storage
396
15.2.4
Key Destruction
396
15.3
SecretSharing
397
15.3.1
Shamir s System
398
15.3.2
Blakley s System
399
15.3.3
Verifiable Secret Sharing
399
15.3.4
Visual Cryptography
400
15.4
Key Recovery
400
15.5
Public Key Infrastructure
402
15.5.1
PGP Certificates
406
15.5.2
X.509 Certificates
408
15.6
Final Remarks
411
References
412
Chapter
16
Summary
415
16.1
Unkeyed Cryptosystems
415
16.2
Secret Key Cryptosystems
417
Contenis
xiii
16.3
Public
Key
Cryptosystems
418
16.4
Final Remarks
419
Chapter
17
Outlook
421
17.1
Theoretical Viewpoint
422
17.2
Practical Viewpoint
424
References
426
Appendix A Discrete Mathematics
427
A.
1
Algebraic Basics
427
A.I
. 1
Preliminary Remarks
428
A.
1.2
Algebraic Sructures
431
A.
1.3
Homomorphisms and Isomorphisms
440
A.
1.4
Permutations
441
A.2 Integer Arithmetic
443
A.2.1 Integer Division
443
A.2.2 Common Divisors and Multiples
445
A.2.3 Euclidean Algorithms
446
A.2.4 Prime Numbers
451
A.2.
5
Factorization
459
A.2.
6
Euler s Totient Function
461
A.3 Modular Arithmetic
462
A.3.1 Modular Congruence
463
A.3.2 Modular Exponentiation
465
A.3
.3
Chinese Remainder Theorem
467
A.3.4
Fermaťs
Little Theorem
469
A.3
.5
Euler s Theorem
470
A.3
.6
Finite Fields
Modulo
Irreducible Polynomials
470
A.3
.7
Quadratic Residuosity
472
A.3.
8
Blum Integers
479
References
480
Appendix
В
Probability Theory
481
B.I Basic Terms and Concepts
481
B.2 Random Variables
487
B.2.
1
Probability Distributions
488
B.2.2 Marginal Distributions
491
B.2.3 Conditional Probability Distributions
492
B.2.4 Expectation
492
B.2.
5
Independence of Random Variables
494
XIV
Contemporary Cryptography
В.2.6
Markov s Inequality
496
B.2.7 Variance and Standard Deviation
497
B.2.8 Chebyshev s Inequality
498
References
499
Appendix
С
Information Theory
501
C.I Introduction
501
C.2 Entropy
505
C.2.1 Joint Entropy
508
C2.2 Conditional Entropy
509
C.2.3 Mutual Information
511
C.3 Redundancy
512
СЛ
Key Equivocation and Unicity Distance
513
References
514
Appendix
D
Complexity Theory
517
D.I Preliminary Remarks
517
D.2 Introduction
519
D.3 Asymptotic Order Notation
522
D.4 Efficient Computations
524
D.5 Computational Models
526
D.6 Complexity Classes
530
D.6.1 Complexity Class V
530
D.6.2 Complexity Classes
MV
and coMV
530
D.63 Complexity Class
W
and Its Subclasses
535
D.7 Shortcomings and Limitations
539
References
540
List of Symbols
543
Abbreviations and Acronyms
549
About the Author
557
Index
559
|
any_adam_object | 1 |
author | Oppliger, Rolf |
author_GND | (DE-588)1019191988 |
author_facet | Oppliger, Rolf |
author_role | aut |
author_sort | Oppliger, Rolf |
author_variant | r o ro |
building | Verbundindex |
bvnumber | BV039161752 |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)745529997 (DE-599)BSZ341272604 |
discipline | Informatik |
edition | 2. ed. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01566nam a22004212c 4500</leader><controlfield tag="001">BV039161752</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120131 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">110727s2011 |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005043576</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608071456</subfield><subfield code="9">978-1-60807-145-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)745529997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ341272604</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1019191988</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary cryptography</subfield><subfield code="c">Rolf Oppliger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 571 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">artech house information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024179230&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024179230</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4123623-3 Lehrbuch gnd-content |
genre_facet | Lehrbuch |
id | DE-604.BV039161752 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T00:00:20Z |
institution | BVB |
isbn | 9781608071456 |
language | English |
lccn | 2005043576 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024179230 |
oclc_num | 745529997 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-12 DE-898 DE-BY-UBR |
owner_facet | DE-91 DE-BY-TUM DE-12 DE-898 DE-BY-UBR |
physical | XXV, 571 S. |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Artech House |
record_format | marc |
series2 | artech house information security and privacy series |
spelling | Oppliger, Rolf Verfasser (DE-588)1019191988 aut Contemporary cryptography Rolf Oppliger 2. ed. Boston [u.a.] Artech House 2011 XXV, 571 S. txt rdacontent n rdamedia nc rdacarrier artech house information security and privacy series Includes bibliographical references and index Cryptography Kryptologie (DE-588)4033329-2 gnd rswk-swf 1\p (DE-588)4123623-3 Lehrbuch gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Digitalisierung BSB Muenchen application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024179230&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Oppliger, Rolf Contemporary cryptography Cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4123623-3 |
title | Contemporary cryptography |
title_auth | Contemporary cryptography |
title_exact_search | Contemporary cryptography |
title_full | Contemporary cryptography Rolf Oppliger |
title_fullStr | Contemporary cryptography Rolf Oppliger |
title_full_unstemmed | Contemporary cryptography Rolf Oppliger |
title_short | Contemporary cryptography |
title_sort | contemporary cryptography |
topic | Cryptography Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptography Kryptologie Lehrbuch |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024179230&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT oppligerrolf contemporarycryptography |