𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

An Introduction to Cryptography, Second Edition

✍ Scribed by Richard A. Mollin


Publisher
Chapman and Hall/CRC
Year
2006
Tongue
English
Leaves
394
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field. With numerous additions and restructured material, this edition presents the ideas behind cryptography and the applications of the subject. The first chapter provides a thorough treatment of the mathematics necessary to understand cryptography, including number theory and complexity, while the second chapter discusses cryptographic fundamentals, such as ciphers, linear feedback shift registers, modes of operation, and attacks. The next several chapters discuss DES, AES, public-key cryptography, primality testing, and various factoring methods, from classical to elliptical curves. The final chapters are comprised of issues pertaining to the Internet, such as pretty good privacy (PGP), protocol layers, firewalls, and cookies, as well as applications, including login and network security, viruses, smart cards, and biometrics. The book concludes with appendices on mathematical data, computer arithmetic, the Rijndael S-Box, knapsack ciphers, the Silver-Pohlig-Hellman algorithm, the SHA-1 algorithm, radix-64 encoding, and quantum cryptography. New to the Second Edition: An introductory chapter that provides more information on mathematical facts and complexity theory Expanded and updated exercises sets, including some routine exercises More information on primality testing and cryptanalysis Accessible and logically organized, An Introduction to Cryptography, Second Edition is the essential book on the fundamentals of cryptography.

✦ Table of Contents


c6188fm
C6188ch1
Chapter 1: Mathematical Basics
1.1 Divisibility
1.2 Primes, Primality Testing, and Induction
1.3 An Introduction to Congruences
1.4 Euler, Fermat, and Wilson
1.5 Primitive Roots
1.6 The Index Calculus and Power Residues
1.7 Legendre, Jacobi, & Quadratic Reciprocity
1.8 Complexity
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch2
Table of Contents file://C6188fm.pdf Chapter 2: Cryptographic Basics
2.1 Definitions and Illustrations
2.2 Classic Ciphers
2.3 Stream Ciphers
2.4 LFSRs
2.5 Modes of Operation
2.6 Attacks
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch3
Table of Contents file://C6188fm.pdf Chapter 3: DES and AES
3.1 S-DES and DES
3.2 AES
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch4
Table of Contents file://C6188fm.pdf Chapter 4: Public-Key Cryptography
4.1 The Ideas Behind PKC
4.2 Digital Envelopes and PKCs
4.3 RSA
(I) RSA Key Generation
(II) RSA Public-Key Cipher
4.4 ElGamal
(I) ElGamal Key Generation
(II) ElGamal Public-Key Cipher
4.5 DSA β€” The DSS
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch5
Table of Contents file://C6188fm.pdf Chapter 5: Primality Testing
5.1 True Primality Tests
5.2 Probabilistic Primality Tests
5.3 Recognizing Primes
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch6
Table of Contents file://C6188fm.pdf Chapter 6: Factoring
6.1 Classical Factorization Methods
6.2 The Continued Fraction Algorithm
6.3 Pollard’s Algorithms
6.4 The Quadratic Sieve
6.5 The Elliptic Curve Method (ECM)
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch7
Table of Contents file://C6188fm.pdf Chapter 7: Electronic Mail and Internet Security
7.1 History of the Internet and the WWW
7.2 Pretty Good Privacy (PGP)
7.3 Protocol Layers and SSL
7.4 Internetworking and Security β€” Firewalls
What A Firewall Can Do
What Firewalls Cannot Do
7.5 Client–Server Model and Cookies
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188ch8
Table of Contents file://C6188fm.pdf Chapter 8: Leading-Edge Applications
8.1 Login and Network Security
Passphrase Selection Criteria
Attacks on Passwords
IEEE
Ethernet and Promiscuous Mode
Packet Sni.er Components
Token Applications
What is SSH?
Basically, How Does SSH work?
Key Exchange Protocol
Authentication
Connection
Exercises
8.2 Viruses and Other Infections
Virus Targets
Stages of a Virus
Types of Viruses
Examples
Virus Detection and Prevention
Advanced Protection
DIS Closed-Loop Process
8.3 Smart Cards
8.4 Biometrics
Exercises
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appa
Table of Contents file://C6188fm.pdf Appendix A: Fundamental Facts
Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appb
Table of Contents file://C6188fm.pdf Appendix B: Computer Arithmetic
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appc
Table of Contents file://C6188fm.pdf Appendix C: The Rijndael S-Box
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appd
Table of Contents file://C6188fm.pdf Appendix D: Knapsack Ciphers
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appe
Table of Contents file://C6188fm.pdf Appendix E: Silver-Pohlig-Hellman Algorithm
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appf
Table of Contents file://C6188fm.pdf Appendix F: SHA-1
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188appg
Table of Contents file://C6188fm.pdf Appendix G: Radix-64 Encoding
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188apph
Table of Contents file://C6188fm.pdf Appendix H: Quantum Cryptography
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188solution
Table of Contents file://C6188fm.pdf Solutions to Odd-Numbered Exercises
Section 1.1
Section 1.2
Section 1.3
Section 1.4
Section 1.5
Section 1.6
Section 1.7
Section 1.8
Section 2.1
Section 2.2
Section 2.3
Section 2.4
Section 2.5
Section 3.1
Section 4.2
Section 4.3
Section 4.4
Section 5.1
Section 5.2
Section 5.3
Section 6.1
Section 6.2
Section 6.3
Section 6.4
Section 6.5
Section 7.1
Section 8.1
Section 8.4
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Bibliography file://C6188bib.pdf About the Author file://C6188author.pdfC6188bib
Table of Contents file://C6188fm.pdf Bibliography
Appendix A: Fundamental Facts file://C6188appa.pdf Appendix B: Computer Arithmetic file://C6188appb.pdf Appendix C: The Rijndael S-Box file://C6188appc.pdf Appendix D: Knapsack Ciphers file://C6188appd.pdf Appendix E: Silver-Pohlig-Hellman Algorithm file://C6188appe.pdf Appendix F: SHA-1 file://C6188appf.pdf Appendix G: Radix-64 Encoding file://C6188appg.pdf Appendix H: Quantum Cryptography file://C6188apph.pdf Solutions to Odd-Numbered Exercises file://C6188solution.pdf About the Author file://C6188author.pdfC6188author
Table of Contents file://C6188fm.pdf About the Author


πŸ“œ SIMILAR VOLUMES


An Introduction to Cryptography, Second
✍ Richard A. Mollin πŸ“‚ Library πŸ“… 2007 πŸ› CRC 🌐 English

Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition provides a solid foundation in cryptographic concepts that features all of the requisite background material on number theory and algorithmic complexity as well as a historical look at the field.With numerous additio

Introduction to cryptography, Second Edi
✍ Johannes Buchmann πŸ“‚ Library πŸ“… 2004 πŸ› Springer 🌐 English

This book explains the basic methods of modern cryptography. It is written for readers with only basic mathematical knowledge who are interested in modern cryptographic algorithms and their mathematical foundation. Several exercises are included following each chapter. From the reviews: "Gives a c