Understanding Cryptography: A Textbook for Students and Practitioners

By Christof Paar, Jan Pelzl

Cryptography is now ubiquitous – relocating past the normal environments, equivalent to govt communications and banking structures, we see cryptographic ideas discovered in net browsers, e mail courses, cellphones, production structures, embedded software program, shrewdpermanent constructions, automobiles, or even scientific implants. state-of-the-art designers want a finished realizing of utilized cryptography.

After an creation to cryptography and information defense, the authors clarify the most thoughts in sleek cryptography, with chapters addressing movement ciphers, the knowledge Encryption typical (DES) and 3DES, the complex Encryption common (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems in response to the discrete logarithm challenge, elliptic-curve cryptography (ECC), electronic signatures, hash capabilities, Message Authentication Codes (MACs), and strategies for key institution, together with certificate and public-key infrastructure (PKI). during the e-book, the authors concentrate on speaking the necessities and conserving the maths to a minimal, they usually movement fast from explaining the principles to describing useful implementations, together with contemporary themes equivalent to light-weight ciphers for RFIDs and cellular units, and present key-length recommendations.

The authors have massive event educating utilized cryptography to engineering and computing device technology scholars and to execs, they usually make huge use of examples, difficulties, and bankruptcy experiences, whereas the book’s web site bargains slides, tasks and hyperlinks to extra assets. it is a compatible textbook for graduate and complex undergraduate classes and in addition for self-study by way of engineers.

Show description

Quick preview of Understanding Cryptography: A Textbook for Students and Practitioners PDF

Best Computer Science books

Web Services, Service-Oriented Architectures, and Cloud Computing, Second Edition: The Savvy Manager's Guide (The Savvy Manager's Guides)

Internet prone, Service-Oriented Architectures, and Cloud Computing is a jargon-free, hugely illustrated rationalization of ways to leverage the speedily multiplying prone to be had on the net. the way forward for company is dependent upon software program brokers, cellular units, private and non-private clouds, enormous facts, and different hugely attached know-how.

Software Engineering: Architecture-driven Software Development

Software program Engineering: Architecture-driven software program improvement is the 1st accomplished consultant to the underlying abilities embodied within the IEEE's software program Engineering physique of information (SWEBOK) normal. criteria professional Richard Schmidt explains the conventional software program engineering practices famous for constructing tasks for presidency or company structures.

Platform Ecosystems: Aligning Architecture, Governance, and Strategy

Platform Ecosystems is a hands-on consultant that gives an entire roadmap for designing and orchestrating brilliant software program platform ecosystems. in contrast to software program items which are controlled, the evolution of ecosystems and their myriad contributors has to be orchestrated via a considerate alignment of structure and governance.

Additional resources for Understanding Cryptography: A Textbook for Students and Practitioners

Show sample text content

255 difficulties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256 10 electronic Signatures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259 10. 1 creation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 10. 1. 1 atypical colours for automobiles, or: Why Symmetric Cryptography isn't enough . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 10. 1. 2 rules of electronic Signatures . . . . . . . . . . . . . . . . . . . . . . . . 261 10. 1. three safeguard companies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263 10. 2 The RSA Signature Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264 Table of Contents xvii 10. 2. 1 Schoolbook RSA electronic Signature . . . . . . . . . . . . . . . . . . . . . 265 10. 2. 2 Computational facets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 10. 2. three safeguard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 267 10. three The Elgamal electronic Signature Scheme . . . . . . . . . . . . . . . . . . . . . . . . 270 10. three. 1 Schoolbook Elgamal electronic Signature . . . . . . . . . . . . . . . . . . 270 10. three. 2 Computational points . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 273 10. three. three safeguard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274 10. four The electronic Signature set of rules (DSA) . . . . . . . . . . . . . . . . . . . . . . . . 277 10. four. 1 The DSA set of rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277 10. four. 2 Computational facets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 280 10. four. three defense . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281 10. five The Elliptic Curve electronic Signature set of rules (ECDSA) . . . . . . . . 282 10. five. 1 The ECDSA set of rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282 10. five. 2 Computational facets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 285 10. five. three protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 286 10. 6 dialogue and extra examining . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287 10. 7 classes discovered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288 difficulties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 289 eleven Hash services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 eleven. 1 Motivation: Signing lengthy Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 eleven. 2 safeguard necessities of Hash features . . . . . . . . . . . . . . . . . . . . . . 296 eleven. 2. 1 Preimage Resistance or One-Wayness . . . . . . . . . . . . . . . . . . . 297 eleven. 2. 2 moment Preimage Resistance or vulnerable Collision Resistance . 297 eleven. 2. three Collision Resistance and the Birthday assault . . . . . . . . . . . . . 299 eleven. three assessment of Hash Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 eleven. three. 1 devoted Hash services: The MD4 relations . . . . . . . . . . . . . 304 eleven. three. 2 Hash capabilities from Block Ciphers . . . . . . . . . . . . . . . . . . . . 305 eleven. four The safe Hash set of rules SHA-1 . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 eleven. four. 1 Preprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 eleven. four. 2 Hash Computation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 eleven. four. three Implementation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 eleven. five dialogue and additional studying . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312 eleven. 6 classes discovered . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 difficulties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 12 Message Authentication Codes (MACs) . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 12. 1 ideas of Message Authentication Codes . . . . . . . . . . . . . . . . . . . . 320 12. 2 MACs from Hash capabilities: HMAC .

Download PDF sample

Rated 4.34 of 5 – based on 26 votes