Cryptography in the information society:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo
World Scientific
[2021]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xii, 273 Seiten |
ISBN: | 9789811226151 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV046986763 | ||
003 | DE-604 | ||
005 | 20210324 | ||
007 | t | ||
008 | 201109s2021 |||| 00||| eng d | ||
020 | |a 9789811226151 |c hardcover |9 978-981-122-615-1 | ||
035 | |a (OCoLC)1237747649 | ||
035 | |a (DE-599)BVBBV046986763 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-703 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Ryabko, Boris |e Verfasser |0 (DE-588)1105771326 |4 aut | |
245 | 1 | 0 | |a Cryptography in the information society |c Boris Ryabko, Russian Academy of Sciences, Russia & Novosibirsk State University, Russia, Andrey Fionov, Siberian State University of Telecommunications and Information Sciences (SibSUTIS), Russia |
264 | 1 | |a New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo |b World Scientific |c [2021] | |
300 | |a xii, 273 Seiten | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Data encryption (Computer science) / Mathematics | |
653 | 0 | |a Cryptography / Mathematics | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Cryptography / Mathematics | |
653 | 0 | |a Data encryption (Computer science) | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Fionov, Andrey |d ca. 20./21. Jd. |e Verfasser |0 (DE-588)1229253610 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-981-122-617-5 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-981-122-616-8 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032394717&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032394717 |
Datensatz im Suchindex
_version_ | 1804181925491900416 |
---|---|
adam_text | Contents Preface v Acknowledgments 1. 2. 3. vii Introduction 1 Problems and Exercises................................................................. 6 Public Key Cryptosystems 7 2.1 2.2 7 Prehistory and Main Ideas.................................................. The First Public-Key System — Diffie-Hellman Key Agreement.................................................................... 2.3 The Elements of NumberTheory........................................ 2.4 Shamir Cipher .................................................................... 2.5 ElGamal Encryption........................................................... 2.6 RSA Encryption and TrapdoorFunctions......................... Problems and Exercises................................................................. Themes for Labs............................................................................. 12 15 22 24 26 30 31 Solving Discrete LogarithmProblem 33 3.1 Problem Setting.................................................................... 3.2 The Baby-step Giant-step Algorithm................................. 3.3 Index Calculus Algorithm.................................................. Problems and Exercises................................................................. Themes for Labs............................................................................. 33 35 37 42 42 ix
Contents x 4. 5. 6. 7. Digital Signatures 43 4.1 RSA Digital Signature......................................................... 4.2 ElGamal Digital Signature................................................... 4.3 Digital Signature Standards................................................ Problems and Exercises................................................................. Themes for Labs............................................................................. 43 46 49 52 53 Cryptographie Protocols 55 5.1 5.2 5.3 Introduction.......................................................................... Mental Poker....................................................................... Zero Knowledge Proofs......................................................... 5.3.1 Graph Coloring Problem....................................... 5.3.2 Hamiltonian Cycle Problem.................................... 5.4 Digital Cash.......................................................................... 5.5 Mutual Identification with Key Establishment.................. Problems and Exercises.................................................................. Themes for Labs............................................................................. 55 56 60 60 63 70 76 81 82 Elliptic Curve Cryptosystems 83 6.1 6.2 6.3 6.4 Introduction........................................................................... Mathematical Foundations................................................... Choosing Curve Parameters................................................ Constructing
Cryptosystems................................................ 6.4.1 Elliptic CurveElGamal Encryption...................... 6.4.2 Elliptic CurveDigital Signature Algorithm .... 6.5 Efficient Implementation of Operations.............................. 6.6 Counting Points on an Elliptic Curve................................. 6.7 Using Standard Curves......................................................... Problems and Exercises.................................................................. Themes for Labs.............................................................................. 83 84 91 93 93 94 96 102 110 112 113 Theoretical Security of Cryptosystems 115 7.1 7.2 7.3 7.4 7.5 115 116 118 119 Introduction.......................................................................... Theory of Perfect Secrecy................................................... The One-Time Pad Cipher................................................... Elements of Information Theory.......................................... Robustness of the One-Time Pad Under Small Deviations of the Key from Randomness............................................. 125
Contents 8. 7.6 Running-Key Ciphers........................................................... 7.7 Unicity Distance for Secret Key Cipher.............................. 7.8 Ideal Cryptosystems........................................................... Problems and Exercises................................................................. 129 133 138 144 Modern Secret Key Ciphers and Hash Functions 145 8.1 8.2 145 148 150 152 155 166 172 172 173 174 176 177 177 179 181 8.3 8.4 8.5 9. xi Introduction.......................................................................... Block Ciphers....................................................................... 8.2.1 The Magma Cipher................................................ 8.2.2 The RC6 Cipher..................................................... 8.2.3 The Rijndael (AES) Cipher.................................... 8.2.4 The Kuznyechik (Grasshopper) Cipher............... Main Modes of Operation of Block Ciphers ..................... 8.3.1 ECB Mode.............................................................. 8.3.2 CBC Mode.............................................................. Stream Ciphers..................................................................... 8.4.1 The OFB Block Cipher Mode .............................. 8.4.2 The CTR Block Cipher Mode .............................. 8.4.3 The RC4 Algorithm................................................ 8.4.4 The HC-128 Algorithm.......................................... Cryptographic Hash Functions .......................................... Cryptocurrencies and the
Blockchain 9.1 9.2 9.3 9.4 9.5 Introduction.......................................................................... 191 Proof-of-work and the Hashcash.......................................... 191 Time-Stamping of Documents............................................. 195 The Blockchain.................................................................... 197 Bitcoin and Cryptocurrencies............................................. 200 9.5.1 Transactions and Bitcoins....................................... 201 9.5.2 Ledger Maintenance and Mining Bitcoins................203 9.5.3 Stability of the Bitcoin System.............................. 204 10. Random Numbers in Cryptography 10.1 10.2 10.3 10.4 191 207 Introduction.......................................................................... 207 Refining Physical Random Number Generators...................208 Pseudo-Random Number Generators................................. 211 Statistical Tests for Random and Pseudo-Random Number 213 Generators
Contents xii 10.5 Distinguishing Attack on Stream Ciphers ........................ 10.6 Statistical Attack on Block Ciphers.................................... 11. Steganography 11.1 Purpose of Steganography................................................... 11.2 Basic Methods of Data Embedding.................................... 11.3 Optimal Embedding under Given Level of Distortion . . . 11.3.1 Problem Setting...................................................... 11.3.2 Stegosystem Based on Linear Hash Functions . . . 11.3.3 Linear Hash Functions over Binary Fields............ 11.3.4 Potential Capacity of Stegosystems Based on Linear Hash Functions....................................... 11.3.5 Methods of Constructing Stegosystems Based on Linear Hash Functions .......................................... 11.4 Asymptotically Optimal Perfect Stegosystems.................. 216 218 229 229 234 236 236 238 239 241 244 246 Answers to Problems and Exercises 255 Bibliography 259 Index 269
|
adam_txt |
Contents Preface v Acknowledgments 1. 2. 3. vii Introduction 1 Problems and Exercises. 6 Public Key Cryptosystems 7 2.1 2.2 7 Prehistory and Main Ideas. The First Public-Key System — Diffie-Hellman Key Agreement. 2.3 The Elements of NumberTheory. 2.4 Shamir Cipher . 2.5 ElGamal Encryption. 2.6 RSA Encryption and TrapdoorFunctions. Problems and Exercises. Themes for Labs. 12 15 22 24 26 30 31 Solving Discrete LogarithmProblem 33 3.1 Problem Setting. 3.2 The Baby-step Giant-step Algorithm. 3.3 Index Calculus Algorithm. Problems and Exercises. Themes for Labs. 33 35 37 42 42 ix
Contents x 4. 5. 6. 7. Digital Signatures 43 4.1 RSA Digital Signature. 4.2 ElGamal Digital Signature. 4.3 Digital Signature Standards. Problems and Exercises. Themes for Labs. 43 46 49 52 53 Cryptographie Protocols 55 5.1 5.2 5.3 Introduction. Mental Poker. Zero Knowledge Proofs. 5.3.1 Graph Coloring Problem. 5.3.2 Hamiltonian Cycle Problem. 5.4 Digital Cash. 5.5 Mutual Identification with Key Establishment. Problems and Exercises. Themes for Labs. 55 56 60 60 63 70 76 81 82 Elliptic Curve Cryptosystems 83 6.1 6.2 6.3 6.4 Introduction. Mathematical Foundations. Choosing Curve Parameters. Constructing
Cryptosystems. 6.4.1 Elliptic CurveElGamal Encryption. 6.4.2 Elliptic CurveDigital Signature Algorithm . 6.5 Efficient Implementation of Operations. 6.6 Counting Points on an Elliptic Curve. 6.7 Using Standard Curves. Problems and Exercises. Themes for Labs. 83 84 91 93 93 94 96 102 110 112 113 Theoretical Security of Cryptosystems 115 7.1 7.2 7.3 7.4 7.5 115 116 118 119 Introduction. Theory of Perfect Secrecy. The One-Time Pad Cipher. Elements of Information Theory. Robustness of the One-Time Pad Under Small Deviations of the Key from Randomness. 125
Contents 8. 7.6 Running-Key Ciphers. 7.7 Unicity Distance for Secret Key Cipher. 7.8 Ideal Cryptosystems. Problems and Exercises. 129 133 138 144 Modern Secret Key Ciphers and Hash Functions 145 8.1 8.2 145 148 150 152 155 166 172 172 173 174 176 177 177 179 181 8.3 8.4 8.5 9. xi Introduction. Block Ciphers. 8.2.1 The Magma Cipher. 8.2.2 The RC6 Cipher. 8.2.3 The Rijndael (AES) Cipher. 8.2.4 The Kuznyechik (Grasshopper) Cipher. Main Modes of Operation of Block Ciphers . 8.3.1 ECB Mode. 8.3.2 CBC Mode. Stream Ciphers. 8.4.1 The OFB Block Cipher Mode . 8.4.2 The CTR Block Cipher Mode . 8.4.3 The RC4 Algorithm. 8.4.4 The HC-128 Algorithm. Cryptographic Hash Functions . Cryptocurrencies and the
Blockchain 9.1 9.2 9.3 9.4 9.5 Introduction. 191 Proof-of-work and the Hashcash. 191 Time-Stamping of Documents. 195 The Blockchain. 197 Bitcoin and Cryptocurrencies. 200 9.5.1 Transactions and Bitcoins. 201 9.5.2 Ledger Maintenance and Mining Bitcoins.203 9.5.3 Stability of the Bitcoin System. 204 10. Random Numbers in Cryptography 10.1 10.2 10.3 10.4 191 207 Introduction. 207 Refining Physical Random Number Generators.208 Pseudo-Random Number Generators. 211 Statistical Tests for Random and Pseudo-Random Number 213 Generators
Contents xii 10.5 Distinguishing Attack on Stream Ciphers . 10.6 Statistical Attack on Block Ciphers. 11. Steganography 11.1 Purpose of Steganography. 11.2 Basic Methods of Data Embedding. 11.3 Optimal Embedding under Given Level of Distortion . . . 11.3.1 Problem Setting. 11.3.2 Stegosystem Based on Linear Hash Functions . . . 11.3.3 Linear Hash Functions over Binary Fields. 11.3.4 Potential Capacity of Stegosystems Based on Linear Hash Functions. 11.3.5 Methods of Constructing Stegosystems Based on Linear Hash Functions . 11.4 Asymptotically Optimal Perfect Stegosystems. 216 218 229 229 234 236 236 238 239 241 244 246 Answers to Problems and Exercises 255 Bibliography 259 Index 269 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Ryabko, Boris Fionov, Andrey ca. 20./21. Jd |
author_GND | (DE-588)1105771326 (DE-588)1229253610 |
author_facet | Ryabko, Boris Fionov, Andrey ca. 20./21. Jd |
author_role | aut aut |
author_sort | Ryabko, Boris |
author_variant | b r br a f af |
building | Verbundindex |
bvnumber | BV046986763 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1237747649 (DE-599)BVBBV046986763 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02007nam a2200433 c 4500</leader><controlfield tag="001">BV046986763</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210324 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">201109s2021 |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9789811226151</subfield><subfield code="c">hardcover</subfield><subfield code="9">978-981-122-615-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1237747649</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046986763</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-703</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ryabko, Boris</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1105771326</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography in the information society</subfield><subfield code="c">Boris Ryabko, Russian Academy of Sciences, Russia & Novosibirsk State University, Russia, Andrey Fionov, Siberian State University of Telecommunications and Information Sciences (SibSUTIS), Russia</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo</subfield><subfield code="b">World Scientific</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xii, 273 Seiten</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science) / Mathematics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography / Mathematics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography / Mathematics</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Fionov, Andrey</subfield><subfield code="d">ca. 20./21. Jd.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1229253610</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-981-122-617-5</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-981-122-616-8</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032394717&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032394717</subfield></datafield></record></collection> |
id | DE-604.BV046986763 |
illustrated | Not Illustrated |
index_date | 2024-07-03T15:51:41Z |
indexdate | 2024-07-10T08:59:24Z |
institution | BVB |
isbn | 9789811226151 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032394717 |
oclc_num | 1237747649 |
open_access_boolean | |
owner | DE-739 DE-703 |
owner_facet | DE-739 DE-703 |
physical | xii, 273 Seiten |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | World Scientific |
record_format | marc |
spelling | Ryabko, Boris Verfasser (DE-588)1105771326 aut Cryptography in the information society Boris Ryabko, Russian Academy of Sciences, Russia & Novosibirsk State University, Russia, Andrey Fionov, Siberian State University of Telecommunications and Information Sciences (SibSUTIS), Russia New Jersey ; London ; Singapore ; Beijing ; Shanghai ; Hong Kong ; Taipei ; Chennai ; Tokyo World Scientific [2021] xii, 273 Seiten txt rdacontent n rdamedia nc rdacarrier Kryptologie (DE-588)4033329-2 gnd rswk-swf Data encryption (Computer science) Cryptography Data encryption (Computer science) / Mathematics Cryptography / Mathematics Kryptologie (DE-588)4033329-2 s DE-604 Fionov, Andrey ca. 20./21. Jd. Verfasser (DE-588)1229253610 aut Erscheint auch als Online-Ausgabe 978-981-122-617-5 Erscheint auch als Online-Ausgabe 978-981-122-616-8 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032394717&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ryabko, Boris Fionov, Andrey ca. 20./21. Jd Cryptography in the information society Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Cryptography in the information society |
title_auth | Cryptography in the information society |
title_exact_search | Cryptography in the information society |
title_exact_search_txtP | Cryptography in the information society |
title_full | Cryptography in the information society Boris Ryabko, Russian Academy of Sciences, Russia & Novosibirsk State University, Russia, Andrey Fionov, Siberian State University of Telecommunications and Information Sciences (SibSUTIS), Russia |
title_fullStr | Cryptography in the information society Boris Ryabko, Russian Academy of Sciences, Russia & Novosibirsk State University, Russia, Andrey Fionov, Siberian State University of Telecommunications and Information Sciences (SibSUTIS), Russia |
title_full_unstemmed | Cryptography in the information society Boris Ryabko, Russian Academy of Sciences, Russia & Novosibirsk State University, Russia, Andrey Fionov, Siberian State University of Telecommunications and Information Sciences (SibSUTIS), Russia |
title_short | Cryptography in the information society |
title_sort | cryptography in the information society |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032394717&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT ryabkoboris cryptographyintheinformationsociety AT fionovandrey cryptographyintheinformationsociety |