Record:   Prev Next
作者 Oppliger, Rolf
書名 Contemporary Cryptography
出版項 Norwood : Artech House, 2005
©2005
國際標準書號 9781580536431 (electronic bk.)
9781580536424
book jacket
說明 1 online resource (529 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
附註 Contemporary Cryptography -- Contents vii -- Foreword xv -- Preface xix -- References xxiii -- Acknowledgments -- Chapter 1 Introduction 1 -- 1.1 CRYPTOLOGY 1 -- 1.2 CRYPTOGRAPHIC SYSTEMS 3 -- 1.3 HISTORICAL BACKGROUND INFORMATION 14 -- 1.4 OUTLINE OF THE BOOK 16 -- References 18 -- Chapter 2 Cryptographic Systems 21 -- 2.1 UNKEYED CRYPTOSYSTEMS 21 -- 2.2 SECRET KEY CRYPTOSYSTEMS 26 -- 2.3 PUBLIC KEY CRYPTOSYSTEMS 32 -- 2.4 FINAL REMARKS 42 -- References 42 -- Part I MATHEMATICAL FUNDAMENTALS 45 -- Chapter 3 Discrete Mathematics 47 -- 3.1 ALGEBRAIC BASICS 47 -- 3.2 INTEGER ARITHMETIC 63 -- 3.3 MODULAR ARITHMETIC 81 -- 3.4 ELLIPTIC CURVES 99 -- 3.5 FINAL REMARKS 101 -- References 102 -- Chapter 4 Probability Theory 103 -- 4.1 BASIC TERMS AND CONCEPTS 104 -- 4.2 RANDOM VARIABLES 109 -- 4.3 FINAL REMARKS 122 -- References 123 -- Chapter 5 Information Theory 125 -- 5.1 INTRODUCTION 125 -- 5.2 ENTROPY 129 -- 5.3 REDUNDANCY 136 -- 5.4 KEY EQUIVOCATION AND UNICITY DISTANCE 138 -- 5.5 FINAL REMARKS 139 -- References 140 -- Chapter 6 Complexity Theory 141 -- 6.1 PRELIMINARY REMARKS 141 -- 6.2 INTRODUCTION 143 -- 6.3 ASYMPTOTIC ORDER NOTATION 146 -- 6.4 EFFICIENT COMPUTATIONS 147 -- 6.5 COMPUTATIONAL MODELS 150 -- 6.6 COMPLEXITY CLASSES 154 -- 6.7 FINAL REMARKS 163 -- References 164 -- Part II UNKEYED CRYPTOSYSTEMS 167 -- Chapter 7 One-Way Functions 169 -- 7.1 INTRODUCTION 169 -- 7.2 CANDIDATE ONE-WAY FUNCTIONS 172 -- 7.3 INTEGER FACTORIZATION ALGORITHMS 180 -- 7.4 ALGORITHMS FOR COMPUTING DISCRETE LOGARITHMS 186 -- 7.5 HARD-CORE PREDICATES 188 -- 7.6 ELLIPTIC CURVE CRYPTOGRAPHY 190 -- 7.7 FINAL REMARKS 191 -- References 192 -- Chapter 8 Cryptographic Hash Functions 195 -- 8.1 INTRODUCTION 195 -- 8.2 MERKLE-DAMG° ARD CONSTRUCTION 199 -- 8.3 EXEMPLARY CRYPTOGRAPHIC HASH FUNCTIONS 201 -- 8.4 FINAL REMARKS 214 -- References 216
Chapter 9 Random Bit Generators 219 -- 9.1 INTRODUCTION 219 -- 9.2 REALIZATIONS AND IMPLEMENTATIONS 221 -- 9.3 STATISTICAL RANDOMNESS TESTING 223 -- 9.4 FINAL REMARKS 224 -- References 225 -- Part III SECRET KEY CRYPTOSYSTEMS 227 -- Chapter 10 Symmetric Encryption Systems 229 -- 10.1 INTRODUCTION 229 -- 10.2 BLOCK CIPHERS 236 -- 10.3 STREAM CIPHERS 277 -- 10.4 PERFECTLY SECURE ENCRYPTION 281 -- 10.5 FINAL REMARKS 287 -- References 288 -- Chapter 11 Message Authentication Codes 291 -- 11.1 INTRODUCTION 291 -- 11.2 COMPUTATIONALLY SECURE MACS 294 -- 11.3 INFORMATION-THEORETICALLY SECURE MACS 305 -- 11.4 FINAL REMARKS 307 -- References 307 -- Chapter 12 Pseudorandom Bit Generators 309 -- 12.1 INTRODUCTION 309 -- 12.2 CRYPTOGRAPHICALLY SECURE PRBG 313 -- 12.3 FINAL REMARKS 318 -- References 319 -- Chapter 13 Pseudorandom Functions 321 -- 13.1 INTRODUCTION 321 -- 13.2 CONSTRUCTIONS 325 -- 13.3 RANDOM ORACLE MODEL 327 -- 13.4 FINAL REMARKS 329 -- References 329 -- Part IV PUBLIC KEY CRYPTOSYSTEMS 331 -- Chapter 14 Asymmetric Encryption Systems 333 -- 14.1 INTRODUCTION 333 -- 14.2 BASIC SYSTEMS 336 -- 14.3 SECURE SYSTEMS 359 -- 14.4 IDENTITY-BASED ENCRYPTION 363 -- 14.5 FINAL REMARKS 365 -- References 365 -- Chapter 15 Digital Signature Systems 369 -- 15.1 INTRODUCTION 369 -- 15.2 BASIC SYSTEMS 372 -- 15.3 SECURE SYSTEMS 388 -- 15.4 ONE-TIME SIGNATURE SYSTEMS 393 -- 15.5 DIGITAL SIGNATURES FOR STREAMS 395 -- 15.6 VARIATIONS 399 -- 15.7 FINAL REMARKS 401 -- References 401 -- Chapter 16 Key Establishment 405 -- 16.1 INTRODUCTION 405 -- 16.2 KEY DISTRIBUTION PROTOCOLS 406 -- 16.3 KEY AGREEMENT PROTOCOLS 411 -- 16.4 QUANTUM CRYPTOGRAPHY 414 -- 16.5 FINAL REMARKS 419 -- References 420 -- Chapter 17 Entity Authentication 423 -- 17.1 INTRODUCTION 423 -- 17.2 AUTHENTICATION TECHNOLOGIES 424 -- 17.3 ZERO-KNOWLEDGE AUTHENTICATION PROTOCOLS 432
17.4 FINAL REMARKS 440 -- References 440 -- Chapter 18 Secure Multiparty Computation 442 -- 18.1 INTRODUCTION 443 -- 18.2 MAJOR RESULTS 446 -- 18.3 FINAL REMARKS 446 -- References 447 -- Part V EPILOGUE 449 -- Chapter 19 Key Management 451 -- 19.1 INTRODUCTION 451 -- 19.2 KEY LIFE CYCLE 453 -- 19.3 SECRET SHARING 455 -- 19.4 KEY RECOVERY 457 -- 19.5 PUBLIC KEY INFRASTRUCTURE 460 -- 19.6 FINAL REMARKS 463 -- References 464 -- Chapter 20 Conclusions 467 -- 20.1 UNKEYED CRYPTOSYSTEMS 467 -- 20.2 SECRET KEY CRYPTOSYSTEMS -- 20.3 PUBLIC KEY CRYPTOSYSTEMS 470 -- 20.4 FINAL REMARKS 471 -- Chapter 21 Outlook 473 -- 21.1 THEORETICAL VIEWPOINT 474 -- 21.2 PRACTICAL VIEWPOINT 476 -- References 477 -- Appendix A Abbreviations and Acronyms 479 -- Appendix B Mathematical Notation 485 -- About the Author 491 -- Index 493
This authoritative work brings you a timely, unified analysis of the various satellite navigation technologies, applications, and services in operation or development, and of the challenges that lie ahead in this rapidly evolving field. It describes the segments, signal characteristics, performance, and securities aspects of the GPS system, including the advances anticipated in the next-generation GPS-III, and brings you up to speed on the developing European GALILEO system and its innovative characteristics, services, and potential. A look at ground-based and satellite-based augmentation systems (GBAS and SBAS) highlights their performance-improving features and how these systems may serve as connection rings between GPS and future networks like GALILEO
Description based on publisher supplied metadata and other sources
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2020. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries
鏈接 Print version: Oppliger, Rolf Contemporary Cryptography Norwood : Artech House,c2005 9781580536424
主題 Cryptography.;Computer security
Electronic books
Record:   Prev Next