Modern cryptography primer: theoretical foundations and practical applications
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2013
|
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis Klappentext |
Beschreibung: | XIV, 238 S. Ill., graph. Darst. |
ISBN: | 9783642413858 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV041473518 | ||
003 | DE-604 | ||
005 | 20171012 | ||
007 | t | ||
008 | 131211s2013 ad|| |||| 00||| eng d | ||
020 | |a 9783642413858 |9 978-3-642-41385-8 | ||
035 | |a (OCoLC)871582882 | ||
035 | |a (DE-599)HBZHT017821814 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-11 |a DE-739 |a DE-634 |a DE-91G |a DE-188 | ||
084 | |a SK 180 |0 (DE-625)143222: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Kościelny, Czesław |e Verfasser |0 (DE-588)1050749537 |4 aut | |
245 | 1 | 0 | |a Modern cryptography primer |b theoretical foundations and practical applications |c Czesław Kościelny ; Mirosław Kurkowski ; Marian Srebrny |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2013 | |
300 | |a XIV, 238 S. |b Ill., graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Kurkowski, Mirosław |e Verfasser |4 aut | |
700 | 1 | |a Srebrny, Marian |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-41386-5 |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=4437891&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Klappentext |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-026919617 |
Datensatz im Suchindex
_version_ | 1806326594510258176 |
---|---|
adam_text |
Contents
Basic
Concepts
and Historical Overview
. 1
1.1
Introduction
. 1
1.1.1
Encryption
. 1
1.1.2
Algorithms and Keys
. 2
1.1.3
Strong Cryptosystems Design Principles
. 4
1.1.4
Computational Complexity of Algorithms
. 5
1.2
Simple Stream Ciphers
. 10
1.2.1
Caesar Cipher
. 10
1.2.2
XOR Encryption
(Vernam
Cipher)
. 11
1.3
Simple Block Ciphers
. 13
1.3.1
Permutations
. 13
1.3.2
Transpositions
. 13
1.3.3
Example of a Simple Transposition Cipher
. 14
1.3.4
Example of a Substitution Block Cipher
. 17
1.3.5
Example of a Product Cipher
. 17
1.3.6
Generalized Substitutions
—
Bigrams
. 18
1.3.7
Polyalphabetic Substitutions
. 20
1.3.8
Vigenère
Cipher
. 20
1.4
Wheel Cipher and Rotor Machines
. 21
1.4.1
Wheel Cipher
. 21
1.4.2
Rotor Machines
. 22
1.5
Enigma
. 23
1.5.1
History of the Enigma
. 24
1.5.2
Construction of the Enigma
. 26
1.5.3
Enigma Operation
. 29
1.5.4
Breaking the Enigma Cipher
. 31
Mathematical Foundations of Cryptography
. 37
2.1
Basic Concepts in the Theory of Algebraic Structures
. 37
2.1.1
Groups
. 38
2.1.2
Rings and Fields
. 40
2.1.3
Finite Fields
. 44
2.1.4
Polynomial Ring
. 45
2.1.5
Applications of Galois Fields
. 49
2.2
Elements of Number Theory
. 50
2.2.1
Divisibility
. 50
2.2.2
Prime Numbers and Their Properties
. 52
2.2.3
Euler's Function
. 55
2.2.4
Modular Congruences
. 55
2.2.5
Simple Modular Equations
. 57
2.2.6
Euler's Theorem
. 59
2.3
Sieve of Eratosthenes, Euclidean Algorithms
. 59
2.3.1
Sieve of Eratosthenes
. 59
2.3.2
Euclidean Algorithm
. 60
2.3.3
Extended Euclidean Algorithm
. 64
2.4
Tests for Primality
. 67
2.4.1
Fermat'sTest
. 67
2.4.2
Fermat's Primality Test
. 68
2.4.3
Miller-Rabin Test
. 69
2.4.4
Algorithm
AKS
. 70
2.5
Computationally Hard Problems in Number Theory
. 71
2.5.1
Factorization
. 72
2.5.2
Discrete Logarithm Problem
. 75
Foundations of Symmetric Cryptography
. 77
3.1
Idea of Symmetric Cryptography
. 77
3.1.1
The Feistel Network
. 78
3.2
The
DES
Algorithm
. 79
3.2.1
S-Boxes
. 79
3.2.2
Description of the
DES
Algorithm
. 80
3.2.3
Breaking
DES
. 85
3.3
Extensions of the
DES
Algorithm
. 86
3.3.1
Triple
DES
. 86
3.3.2
DESX
. 87
3.4
Modes of Operation of the
DES
Algorithm
. 87
3.4.1
Electronic
Codebook
Mode of Operation
. 87
3.4.2
Cipher Block-Chaining Mode of Operation
. 87
3.4.3
Cipher Feedback Mode of Operation
. 89
3.5
The IDEA Algorithm
. 90
3.6
RC Algorithms
. 92
3.6.1
RC4 Algorithm
. 92
3.6.2
RC5 Algorithm
. 94
3.6.3
RCS-Breaking Project
. 96
3.6.4
RC6 Algorithm
. 99
3.7
AES
—
The Successor to
DES
. 100
3.7.1
Mathematical Foundations of AES
. 100
3.7.2
Description of the Algorithm
. 108
3.7.3
Key Expansion
.
Ill
3.7.4
Encryption Algorithm
. 113
3.7.5
Decryption Algorithm
. 114
3.8
Generalizations and Refinements of
DES,
IDEA and AES
. 117
3.8.1
Algorithms DES-768, IDEA-832, AES-1408, AES-1664,
andAES-1920
. 117
3.8.2
Generalized
DES
and AES Ciphers
. 118
Foundations of Asymmetric Cryptography
. 119
4.1
Idea of Asymmetric Cryptography
. 119
4.2
The Diffie-Hellman Algorithm
. 120
4.3
The ElGamal Algorithm
. 121
4.4
The RSA Algorithm
. 123
4.4.1
Key Generation
. 123
4.4.2
Encryption and Decryption
. 124
An Electronic Signature and Hash Functions
. 127
5.1
Digital Signature Algorithms
. 127
5.1.1
A Digital Signature
. 128
5.1.2
The RSA Signature
. 129
5.1.3
The ElGamal Signature
. 130
5.1.4
DSA Signature
. 131
5.2
Cryptographic Hash Functions
. 132
5.2.1
Classification of Hash Functions
. 134
5.2.2
Birthday Paradox and Brute Force
. 135
5.2.3
MD5 Algorithm
. 136
5.2.4
SHA-1 Algorithm
. 140
5.2.5
Keccak/SHA-3
. 142
PGP Systems and TrueCrypt
. 147
6.1
PGP System
. 147
6.1.1
The Idea and the History of PGP
. 147
6.1.2
PGP Algorithms
. 149
6.1.3
The Use of PGP
. 152
6.1.4
Web of Trust and Key Certification
. 161
6.2
FireGPG and Enigmail
. 162
6.3
TrueCrypt
. 164
6.3.1
Formating the TrueCrypt Volume
. 165
6.3.2
Encrypting a Partition
. 169
6.3.3
Forming a Hidden Volume
. 170
6.3.4
Work with Hidden Volumes
. 171
6.3.5
The Usage of Keyfiles
. 171
6.3.6
Summary
. 172
7
Public
Key Infrastructure
. 175
7.1
Public Key Infrastructure and Its Services
. 175
7.2
Modern Web Threats
. 175
7.3
Trusted Third Party, Certification Process
. 176
7.4
PKI
. 180
7.5
Certificates, Keys and Management
. 183
7.5.1
Generating and Installing the Certificates
. 183
7.5.2
Configuration of Certificate
. 184
7.5.3
Cancellation of Certificates
. 190
8
Cryptographic Protocols
. 193
8.1
Examples of Cryptographic Protocols
. 194
8.2
Reliability
. 195
8.2.1
The Needham-Schroeder Protocol
. 196
8.3
Needham-Schroeder Symmetric Key Protocol
. 199
8.4
Timestamps
. 201
8.5
Key Exchange Public-Key Protocol
. 202
8.6 Kerberos
System
. 203
8.6.1
Description of
Kerberos
Components
. 204
8.6.2
Example of Application of
Kerberos. 206
8.7
Verification of Correctness of Cryptographic Protocols
. 207
8.7.1
Axiomatic (Deductive) Method
. 208
8.7.2
Model Checking
. 209
8.7.3
Inductive Method
. 209
8.7.4
Results
. 210
8.7.5
Summary
. 211
9
Cryptographic Applications for Network Security
. 213
9.1
Application of Cryptography to Internet Mail Systems Security
. 213
9.1.1
РЕМ
. 213
9.1.2
S/MIME
. 214
9.1.3
MOSS
. 216
9.2
Security of Document Interchange
. 216
9.2.1
EDI
. 217
9.2.2
OpenEDI
. 217
9.2.3
OBI
. 218
9.2.4
Swift, Edifact
. 218
9.2.5
EDI in Practice
. 219
9.3
Computer Network Security
—
SSH and SSL Protocols
. 220
9.3.1
Introduction
. 220
9.3.2
Idea of the SSH Protocol
. 221
9.3.3
Using the SSH Protocol
. 224
9.3.4
Construction of SSL Protocol
. 225
9.3.5
The Use of SSL in Practice
. 227
9.4
Wireless Network Security
. 229
9.4.1
WEP Protocol
. 229
9.4.2
WPA Protocol and Its Modifications
. 230
References
. 233
Index
. 237
Cryptography has experienced rapid development, with major advances recently in both
secret and public key ciphers, cryptographic hash functions, cryptographic algorithms
and multiparty protocols, including their software engineering correctness verification,
and various methods of cryptanalysis. This textbook introduces the reader to these
areas, offering an understanding of the essential, most important, and most interesting
ideas, based on the authors' teaching and research experience.
After introducing the basic mathematical and computational complexity concepts, and
some historical context, including the story of Enigma, the authors explain symmetric
and asymmetric cryptography, electronic signatures and hash functions, PGP systems,
public key infrastructures, cryptographic protocols, and applications in network se¬
curity. In each case the text presents the key technologies, algorithms, and protocols,
along with methods of design and analysis, while the content is characterized by
a visual style and all algorithms are presented in readable pseudocode or using simple
graphics and diagrams.
The book is suitable for undergraduate and graduate courses in computer science and
engineering, particularly in the area of networking, and it is also a suitable reference
text for self-study by practitioners and researchers. The authors assume only basic
elementary mathematical experience, the text covers the foundational mathematics
and computational complexity theory. |
any_adam_object | 1 |
author | Kościelny, Czesław Kurkowski, Mirosław Srebrny, Marian |
author_GND | (DE-588)1050749537 |
author_facet | Kościelny, Czesław Kurkowski, Mirosław Srebrny, Marian |
author_role | aut aut aut |
author_sort | Kościelny, Czesław |
author_variant | c k ck m k mk m s ms |
building | Verbundindex |
bvnumber | BV041473518 |
classification_rvk | SK 180 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)871582882 (DE-599)HBZHT017821814 |
discipline | Informatik Mathematik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV041473518</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20171012</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">131211s2013 ad|| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642413858</subfield><subfield code="9">978-3-642-41385-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)871582882</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)HBZHT017821814</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 180</subfield><subfield code="0">(DE-625)143222:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kościelny, Czesław</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1050749537</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Modern cryptography primer</subfield><subfield code="b">theoretical foundations and practical applications</subfield><subfield code="c">Czesław Kościelny ; Mirosław Kurkowski ; Marian Srebrny</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 238 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kurkowski, Mirosław</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Srebrny, Marian</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-41386-5</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=4437891&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Klappentext</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-026919617</subfield></datafield></record></collection> |
id | DE-604.BV041473518 |
illustrated | Illustrated |
indexdate | 2024-08-03T01:07:59Z |
institution | BVB |
isbn | 9783642413858 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-026919617 |
oclc_num | 871582882 |
open_access_boolean | |
owner | DE-11 DE-739 DE-634 DE-91G DE-BY-TUM DE-188 |
owner_facet | DE-11 DE-739 DE-634 DE-91G DE-BY-TUM DE-188 |
physical | XIV, 238 S. Ill., graph. Darst. |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Springer |
record_format | marc |
spelling | Kościelny, Czesław Verfasser (DE-588)1050749537 aut Modern cryptography primer theoretical foundations and practical applications Czesław Kościelny ; Mirosław Kurkowski ; Marian Srebrny Berlin [u.a.] Springer 2013 XIV, 238 S. Ill., graph. Darst. txt rdacontent n rdamedia nc rdacarrier Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Kurkowski, Mirosław Verfasser aut Srebrny, Marian Verfasser aut Erscheint auch als Online-Ausgabe 978-3-642-41386-5 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=4437891&prov=M&dok_var=1&dok_ext=htm Inhaltstext Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Klappentext |
spellingShingle | Kościelny, Czesław Kurkowski, Mirosław Srebrny, Marian Modern cryptography primer theoretical foundations and practical applications Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Modern cryptography primer theoretical foundations and practical applications |
title_auth | Modern cryptography primer theoretical foundations and practical applications |
title_exact_search | Modern cryptography primer theoretical foundations and practical applications |
title_full | Modern cryptography primer theoretical foundations and practical applications Czesław Kościelny ; Mirosław Kurkowski ; Marian Srebrny |
title_fullStr | Modern cryptography primer theoretical foundations and practical applications Czesław Kościelny ; Mirosław Kurkowski ; Marian Srebrny |
title_full_unstemmed | Modern cryptography primer theoretical foundations and practical applications Czesław Kościelny ; Mirosław Kurkowski ; Marian Srebrny |
title_short | Modern cryptography primer |
title_sort | modern cryptography primer theoretical foundations and practical applications |
title_sub | theoretical foundations and practical applications |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=4437891&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000003&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=026919617&sequence=000004&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT koscielnyczesław moderncryptographyprimertheoreticalfoundationsandpracticalapplications AT kurkowskimirosław moderncryptographyprimertheoreticalfoundationsandpracticalapplications AT srebrnymarian moderncryptographyprimertheoreticalfoundationsandpracticalapplications |