๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Computational Cryptography: Algorithmic Aspects of Cryptology

โœ Scribed by Joppe Bos (editor), Martijn Stam (editor)


Publisher
Cambridge University Press
Year
2022
Tongue
English
Leaves
402
Series
London Mathematical Society Lecture Note Series, Series Number 469
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The area of computational cryptography is dedicated to the development of effective methods in algorithmic number theory that improve implementation of cryptosystems or further their cryptanalysis. This book is a tribute to Arjen K. Lenstra, one of the key contributors to the field, on the occasion of his 65th birthday, covering his best-known scientific achievements in the field. Students and security engineers will appreciate this no-nonsense introduction to the hard mathematical problems used in cryptography and on which cybersecurity is built, as well as the overview of recent advances on how to solve these problems from both theoretical and practical applied perspectives. Beginning with polynomials, the book moves on to the celebrated Lenstraโ€“Lenstraโ€“Lovรกsz lattice reduction algorithm, and then progresses to integer factorization and the impact of these methods to the selection of strong cryptographic keys for usage in widely used standards.

โœฆ Table of Contents


Cover
Series information
Endorsements
Title page
Copyright information
Contents
List of Contributors
Preface
1 Introduction
1.1 Biographical Sketch
1.2 Outline
PART I CRYPTANALYSIS
2 Lattice Attacks on NTRU and LWE: A History of Refinements
2.1 Introduction
2.2 Notation and Preliminaries
2.3 Lattice Reduction: Theory
2.4 Practical Behaviour on Random Lattices
2.5 Behaviour on LWE Instances
2.6 Behaviour on NTRU Instances
3 History of Integer Factorisation
3.1 The Dark Ages: Before RSA
3.2 The Enlightenment: RSA
3.3 The Renaissance: Continued Fractions
3.4 The Reformation: A Quadratic Sieve
3.5 The Revolution: A Number Field Sieve
3.6 An Exquisite Diversion: Elliptic Curves
3.7 The Future: How Hard Can Factoring Be?
4 Lattice-Based Integer Factorisation: An Introduction to Coppersmithโ€™s Method
4.1 Introduction to Coppersmithโ€™s Method
4.2 Useful Coppersmith-Type Theorems
4.3 Applications in the Univariate Case
4.4 Multivariate Applications: Small Secret Exponent RSA
4.5 Open Problems and Further Directions
5 Computing Discrete Logarithms
5.1 Introduction
5.2 Elliptic Curves
5.3 Some Group Descriptions with Easier Discrete Logarithms
5.4 Discrete Logarithms for XTR and Algebraic Tori
5.5 Discrete Logarithms in Finite Fields of Fixed Characteristic
5.6 Conclusion
6 RSA, DH and DSA in the Wild
6.1 Introduction
6.2 RSA
6.3 Diffieโ€“Hellman
6.4 Elliptic-Curve Diffieโ€“Hellman
6.5 (EC)DSA
6.6 Conclusion
7 A Survey of Chosen-Prefix Collision Attacks
7.1 Cryptographic Hash Functions
7.2 Chosen-Prefix Collisions
7.3 Chosen-Prefix Collision Abuse Scenarios
7.4 MD5 Collision Attacks
PART II IMPLEMENTATIONS
8 Efficient Modular Arithmetic
8.1 Montgomery Multiplication
8.2 Arithmetic for RSA
8.3 Arithmetic for ECC
8.4 Special Arithmetic
9 Arithmetic Software Libraries
9.1 Introduction
9.2 Long-Integer Arithmetic
9.3 Number-Theoretic Transforms
9.4 Arithmetic in Z[sub(p)][X] for Multi-Precision p
9.5 Arithmetic in Z[sub(p)][X] for Single-Precision p
9.6 Matrix Arithmetic over Z[sub(p)]
9.7 Polynomial and Matrix Arithmetic over Other Finite Rings
9.8 Polynomial and Matrix Arithmetic over Z
9.9 The Future of NTL
10 XTR and Tori
10.1 The Birth of XTR
10.2 The Magic of XTR
10.3 The Conservative Use of Tori
10.4 Pairings with Elliptic Curves
10.5 Over the Edge: Cyclotomic Subgroups Recycled
11 History of Cryptographic Key Sizes
11.1 Introduction
11.2 Attacking Symmetric Algorithms with Software and Hardware
11.3 Software Attacks on Factoring and Discrete Logarithms
11.4 Hardware for Factoring
11.5 Attacking Cryptosystems Based on Elliptic Curves
11.6 Post-Quantum Cryptography
11.7 Key-Size Recommendation
References
Index

โœฆ Subjects


Cryptography; Cryptanalysis; RSA; DH; DSA


๐Ÿ“œ SIMILAR VOLUMES


Algebraic Aspects of Cryptography (Algor
โœ Neal Koblitz ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐Ÿ› Springer ๐ŸŒ English

From the reviews: "This is a textbook in cryptography with emphasis on algebraic methods. It is supported by many exercises (with answers) making it appropriate for a course in mathematics or computer science. [...] Overall, this is an excellent expository text, and will be very useful to both the s

A Brief History of Cryptology and Crypto
โœ John F. Dooley (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the

A Brief History of Cryptology and Crypto
โœ John F. Dooley (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the

A brief history of cryptology and crypto
โœ John F. Dooley (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2013 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the

Algorithmic Aspects of Cloud Computing
โœ Timos Sellis and Konstantinos Oikonomou ๐Ÿ“‚ Library ๐Ÿ“… 2017 ๐Ÿ› Springer ๐ŸŒ English

This book constitutes the thoroughly refereed post-conference proceedings of the Second International Workshop on Algorithmic Aspects of Cloud Computing, ALGOCLOUD 2016, held in Aarhus, Denmark, in August 2016. <br><br>The 11 revised full papers presented together with one tutorial paper were carefu