Introduction to Modern Cryptography 2/e
售價
$
1,400
- 一般書籍
- ISBN:9781466570269
- 作者:Jonathan Katz, Yehuda Lindell
- 版次:2
- 年份:2015
- 出版商:Taylor & Francis
- 頁數/規格:583頁/精裝單色
書籍介紹
目錄
Description
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptographyprovides a rigorous yet accessible treatment of this fascinating subject.
The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes.
Integrating a more practical perspective without sacrificing rigor, this widely anticipatedSecond Edition offers improved treatment of:
Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptographyprovides a rigorous yet accessible treatment of this fascinating subject.
The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes.
Integrating a more practical perspective without sacrificing rigor, this widely anticipatedSecond Edition offers improved treatment of:
- Stream ciphers and block ciphers, including modes of operation and design principles
- Authenticated encryption and secure communication sessions
- Hash functions, including hash-function applications and design principles
- Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacks
- The random-oracle model and its application to several standardized, widely used public-key encryption and signature schemes
- Elliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIES
Table of Contents
Preface
I. Introduction and Classical Cryptography
1. Introduction
2. Perfectly Secret Encryption
II. Private-Key (Symmetric) Cryptography
3. Private-Key Encryption
4. Message Authentication Codes
5. Hash Functions and Applications
6. Practical Constructions of Symmetric-Key Primitives
7. *Theoretical Constructions of Symmetric-Key Primitives
III. Public-Key (Asymmetric) Cryptography
8. Number Theory and Cryptographic Hardness Assumptions
9. *Algorithms for Factoring and Computing Discrete Logarithms
10. Key Management and the Public-Key Revolution
11. Public-Key Encryption
12. Digital Signature Schemes
13. *Advanced Topics in Public-Key Encryption
Appendix A: Mathematical Background
Appendix B: Basic Algorithmic Number Theory
Preface
I. Introduction and Classical Cryptography
1. Introduction
2. Perfectly Secret Encryption
II. Private-Key (Symmetric) Cryptography
3. Private-Key Encryption
4. Message Authentication Codes
5. Hash Functions and Applications
6. Practical Constructions of Symmetric-Key Primitives
7. *Theoretical Constructions of Symmetric-Key Primitives
III. Public-Key (Asymmetric) Cryptography
8. Number Theory and Cryptographic Hardness Assumptions
9. *Algorithms for Factoring and Computing Discrete Logarithms
10. Key Management and the Public-Key Revolution
11. Public-Key Encryption
12. Digital Signature Schemes
13. *Advanced Topics in Public-Key Encryption
Appendix A: Mathematical Background
Appendix B: Basic Algorithmic Number Theory