Muutke küpsiste eelistusi

E-raamat: Cryptography In The Information Society

(Siberian State Univ Of Telecommunications & Information Sci, Russia), (Russian Academy Of Sciences, Russia & Novosibirsk State Univ, Russia)
  • Formaat: 288 pages
  • Ilmumisaeg: 04-Jan-2021
  • Kirjastus: World Scientific Publishing Co Pte Ltd
  • Keel: eng
  • ISBN-13: 9789811226175
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 70,20 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: 288 pages
  • Ilmumisaeg: 04-Jan-2021
  • Kirjastus: World Scientific Publishing Co Pte Ltd
  • Keel: eng
  • ISBN-13: 9789811226175
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This textbook describes the main techniques and features of contemporary cryptography, but does so using secondary school mathematics so that the concepts discussed can be understood by non-mathematicians. The topics addressed include block ciphers, stream ciphers, public key encryption, digital signatures, cryptographic protocols, elliptic curve cryptography, theoretical security, blockchain and cryptocurrencies, issues concerning random numbers, and steganography. The key results discussed in each chapter are mathematically proven, and the methods are described in sufficient detail to enable their computational implementation. Exercises are provided.

Preface v
Acknowledgments vii
1 Introduction
1(6)
Problems and Exercises
6(1)
2 Public Key Cryptosystems
7(26)
2.1 Prehistory and Main Ideas
7(5)
2.2 The First Public-Key System --- Diffie-Hellman Key Agreement
12(3)
2.3 The Elements of Number Theory
15(7)
2.4 Shamir Cipher
22(2)
2.5 ElGamal Encryption
24(2)
2.6 RSA Encryption and Trapdoor Functions
26(4)
Problems and Exercises
30(1)
Themes for Labs
31(2)
3 Solving Discrete Logarithm Problem
33(10)
3.1 Problem Setting
33(2)
3.2 The Baby-step Giant-step Algorithm
35(2)
3.3 Index Calculus Algorithm
37(5)
Problems and Exercises
42(1)
Themes for Labs
42(1)
4 Digital Signatures
43(12)
4.1 RSA Digital Signature
43(3)
4.2 ElGamal Digital Signature
46(3)
4.3 Digital Signature Standards
49(3)
Problems and Exercises
52(1)
Themes for Labs
53(2)
5 Cryptographic Protocols
55(28)
5.1 Introduction
55(1)
5.2 Mental Poker
56(4)
5.3 Zero Knowledge Proofs
60(10)
5.3.1 Graph Coloring Problem
60(3)
5.3.2 Hamiltonian Cycle Problem
63(7)
5.4 Digital Cash
70(6)
5.5 Mutual Identification with Key Establishment
76(5)
Problems and Exercises
81(1)
Themes for Labs
82(1)
6 Elliptic Curve Cryptosystems
83(32)
6.1 Introduction
83(1)
6.2 Mathematical Foundations
84(7)
6.3 Choosing Curve Parameters
91(2)
6.4 Constructing Cryptosystems
93(3)
6.4.1 Elliptic Curve ElGamal Encryption
93(1)
6.4.2 Elliptic Curve Digital Signature Algorithm
94(2)
6.5 Efficient Implementation of Operations
96(6)
6.6 Counting Points on an Elliptic Curve
102(8)
6.7 Using Standard Curves
110(2)
Problems and Exercises
112(1)
Themes for Labs
113(2)
7 Theoretical Security of Cryptosystems
115(30)
7.1 Introduction
115(1)
7.2 Theory of Perfect Secrecy
116(2)
7.3 The One-Time Pad Cipher
118(1)
7.4 Elements of Information Theory
119(6)
7.5 Robustness of the One-Time Pad Under Small Deviations of the Key from Randomness
125(4)
7.6 Running-Key Ciphers
129(4)
7.7 Unicity Distance for Secret Key Cipher
133(5)
7.8 Ideal Cryptosystems
138(6)
Problems and Exercises
144(1)
8 Modern Secret Key Ciphers and Hash Functions
145(46)
8.1 Introduction
145(3)
8.2 Block Ciphers
148(24)
8.2.1 The Magma Cipher
150(2)
8.2.2 The RC6 Cipher
152(3)
8.2.3 The Rijndael (AES) Cipher
155(11)
8.2.4 The Kuznyechik (Grasshopper) Cipher
166(6)
8.3 Main Modes of Operation of Block Ciphers
172(2)
8.3.1 ECB Mode
172(1)
8.3.2 CBC Mode
173(1)
8.4 Stream Ciphers
174(7)
8.4.1 The OFB Block Cipher Mode
176(1)
8.4.2 The CTR Block Cipher Mode
177(1)
8.4.3 The RC4 Algorithm
177(2)
8.4.4 The HC-128 Algorithm
179(2)
8.5 Cryptographic Hash Functions
181(10)
9 Cryptocurrencies and the Blockchain
191(16)
9.1 Introduction
191(1)
9.2 Proof-of-work and the Hashcash
191(4)
9.3 Time-Stamping of Documents
195(2)
9.4 The Blockchain
197(3)
9.5 Bitcoin and Cryptocurrencies
200(7)
9.5.1 Transactions and Bitcoins
201(2)
9.5.2 Ledger Maintenance and Mining Bitcoins
203(1)
9.5.3 Stability of the Bitcoin System
204(3)
10 Random Numbers in Cryptography
207(22)
10.1 Introduction
207(1)
10.2 Refining Physical Random Number Generators
208(3)
10.3 Pseudo-Random Number Generators
211(2)
10.4 Statistical Tests for Random and Pseudo-Random Number Generators
213(3)
10.5 Distinguishing Attack on Stream Ciphers
216(2)
10.6 Statistical Attack on Block Ciphers
218(11)
11 Steganography
229(26)
11.1 Purpose of Steganography
229(5)
11.2 Basic Methods of Data Embedding
234(2)
11.3 Optimal Embedding under Given Level of Distortion
236(10)
11.3.1 Problem Setting
236(2)
11.3.2 Stegosystem Based on Linear Hash Functions
238(1)
11.3.3 Linear Hash Functions over Binary Fields
239(2)
11.3.4 Potential Capacity of Stegosystems Based on Linear Hash Functions
241(3)
11.3.5 Methods of Constructing Stegosystems Based on Linear Hash Functions
244(2)
11.4 Asymptotically Optimal Perfect Stegosystems
246(9)
Answers to Problems and Exercises 255(4)
Bibliography 259(10)
Index 269