𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Cryptanalysis of Number Theoretic Ciphers

✍ Scribed by Samuel S. Wagstaff, Jr. (Author)


Publisher
Chapman and Hall/CRC
Year
2002
Leaves
335
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


At the heart of modern cryptographic algorithms lies computational number theory. Whether you`re encrypting or decrypting ciphers, a solid background in number theory is essential for success. Written by a number theorist and practicing cryptographer, Cryptanalysis of Number Theoretic Ciphers takes you from basic number theory to the inner workings of ciphers and protocols.

First, the book provides the mathematical background needed in cryptography as well as definitions and simple examples from cryptography. It includes summaries of elementary number theory and group theory, as well as common methods of finding or constructing large random primes, factoring large integers, and computing discrete logarithms. Next, it describes a selection of cryptographic algorithms, most of which use number theory. Finally, the book presents methods of attack on the cryptographic algorithms and assesses their effectiveness. For each attack method the author lists the systems it applies to and tells how they may be broken with it.

Computational number theorists are some of the most successful cryptanalysts against public key systems. Cryptanalysis of Number Theoretic Ciphers builds a solid foundation in number theory and shows you how to apply it not only when breaking ciphers, but also when designing ones that are difficult to break.

✦ Table of Contents


MATHEMATICAL FOUNDATIONS OF CRYPTANALYSIS

Terminology of Cryptography

Probability Theory

Divisibility and Arithmetic

Primes

Congruences

Euler`s Theorem and Its Consequences

Second Degree Congruences

Information Theory

Groups, Rings and Fields

Finding Large Primes

Exponential Methods of Factoring Integers

Elliptic Curves

Subexponential Factoring Algorithms

Computing Discrete Logarithms

Random Number Generation

THE CRYPTOGRAPHIC ALGORITHMS

Private Key Algorithms

Public Key Algorithms

Signature Algorithms

Key Exchange Algorithms

Simple Protocols

Complicated Protocols

Complete Systems

METHODS OF ATTACK

Direct Attacks

Exploiting a User Error

Active Attacks

References


πŸ“œ SIMILAR VOLUMES


Cryptanalysis: a Study of Ciphers and Th
✍ Gaines, Helen F πŸ“‚ Library πŸ“… 2014;2013 πŸ› Dover Publications 🌐 English

Cover; Title; Copyright; Dedication; PREFACE; Contents; I. GENERAL INFORMATION; II. CONCEALMENT DEVICES; III. TRANSPOSITION TYPES; IV. GEOMETRICAL TYPES- THE NIHILIST TRANSPOSITION; V. GEOMETRICAL TYPES- THE TURNING GRILLE; VI. IRREGULAR TYPES- COLUMNAR TRANSPOSITION .; VII. GENERAL METHODS- MULTIPL

Cryptanalysis: A Study of Ciphers and Th
✍ Gaines, Helen F πŸ“‚ Library πŸ“… 2014 πŸ› Dover Publications 🌐 English

Cover; Title; Copyright; Dedication; PREFACE; Contents; I. GENERAL INFORMATION; II. CONCEALMENT DEVICES; III. TRANSPOSITION TYPES; IV. GEOMETRICAL TYPES- THE NIHILIST TRANSPOSITION; V. GEOMETRICAL TYPES- THE TURNING GRILLE; VI. IRREGULAR TYPES- COLUMNAR TRANSPOSITION .; VII. GENERAL METHODS- MULTIPL

Advanced Linear Cryptanalysis of Block a
✍ P Junod, A. Canteaut πŸ“‚ Library πŸ“… 2011 πŸ› IOS Press 🌐 English

The origins of linear cryptanalysis can be traced back to a number of seminal works of the early 1990s. Since its invention, several theoretical and practical aspects of the technique have been studied, understood and generalized, resulting in more elaborated attacks against certain ciphers, but als