Preface |
|
v | |
Acknowledgments |
|
vii | |
|
|
1 | (6) |
|
|
6 | (1) |
|
2 Public Key Cryptosystems |
|
|
7 | (26) |
|
2.1 Prehistory and Main Ideas |
|
|
7 | (5) |
|
2.2 The First Public-Key System --- Diffie-Hellman Key Agreement |
|
|
12 | (3) |
|
2.3 The Elements of Number Theory |
|
|
15 | (7) |
|
|
22 | (2) |
|
|
24 | (2) |
|
2.6 RSA Encryption and Trapdoor Functions |
|
|
26 | (4) |
|
|
30 | (1) |
|
|
31 | (2) |
|
3 Solving Discrete Logarithm Problem |
|
|
33 | (10) |
|
|
33 | (2) |
|
3.2 The Baby-step Giant-step Algorithm |
|
|
35 | (2) |
|
3.3 Index Calculus Algorithm |
|
|
37 | (5) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (12) |
|
4.1 RSA Digital Signature |
|
|
43 | (3) |
|
4.2 ElGamal Digital Signature |
|
|
46 | (3) |
|
4.3 Digital Signature Standards |
|
|
49 | (3) |
|
|
52 | (1) |
|
|
53 | (2) |
|
5 Cryptographic Protocols |
|
|
55 | (28) |
|
|
55 | (1) |
|
|
56 | (4) |
|
5.3 Zero Knowledge Proofs |
|
|
60 | (10) |
|
5.3.1 Graph Coloring Problem |
|
|
60 | (3) |
|
5.3.2 Hamiltonian Cycle Problem |
|
|
63 | (7) |
|
|
70 | (6) |
|
5.5 Mutual Identification with Key Establishment |
|
|
76 | (5) |
|
|
81 | (1) |
|
|
82 | (1) |
|
6 Elliptic Curve Cryptosystems |
|
|
83 | (32) |
|
|
83 | (1) |
|
6.2 Mathematical Foundations |
|
|
84 | (7) |
|
6.3 Choosing Curve Parameters |
|
|
91 | (2) |
|
6.4 Constructing Cryptosystems |
|
|
93 | (3) |
|
6.4.1 Elliptic Curve ElGamal Encryption |
|
|
93 | (1) |
|
6.4.2 Elliptic Curve Digital Signature Algorithm |
|
|
94 | (2) |
|
6.5 Efficient Implementation of Operations |
|
|
96 | (6) |
|
6.6 Counting Points on an Elliptic Curve |
|
|
102 | (8) |
|
6.7 Using Standard Curves |
|
|
110 | (2) |
|
|
112 | (1) |
|
|
113 | (2) |
|
7 Theoretical Security of Cryptosystems |
|
|
115 | (30) |
|
|
115 | (1) |
|
7.2 Theory of Perfect Secrecy |
|
|
116 | (2) |
|
7.3 The One-Time Pad Cipher |
|
|
118 | (1) |
|
7.4 Elements of Information Theory |
|
|
119 | (6) |
|
7.5 Robustness of the One-Time Pad Under Small Deviations of the Key from Randomness |
|
|
125 | (4) |
|
|
129 | (4) |
|
7.7 Unicity Distance for Secret Key Cipher |
|
|
133 | (5) |
|
|
138 | (6) |
|
|
144 | (1) |
|
8 Modern Secret Key Ciphers and Hash Functions |
|
|
145 | (46) |
|
|
145 | (3) |
|
|
148 | (24) |
|
|
150 | (2) |
|
|
152 | (3) |
|
8.2.3 The Rijndael (AES) Cipher |
|
|
155 | (11) |
|
8.2.4 The Kuznyechik (Grasshopper) Cipher |
|
|
166 | (6) |
|
8.3 Main Modes of Operation of Block Ciphers |
|
|
172 | (2) |
|
|
172 | (1) |
|
|
173 | (1) |
|
|
174 | (7) |
|
8.4.1 The OFB Block Cipher Mode |
|
|
176 | (1) |
|
8.4.2 The CTR Block Cipher Mode |
|
|
177 | (1) |
|
|
177 | (2) |
|
8.4.4 The HC-128 Algorithm |
|
|
179 | (2) |
|
8.5 Cryptographic Hash Functions |
|
|
181 | (10) |
|
9 Cryptocurrencies and the Blockchain |
|
|
191 | (16) |
|
|
191 | (1) |
|
9.2 Proof-of-work and the Hashcash |
|
|
191 | (4) |
|
9.3 Time-Stamping of Documents |
|
|
195 | (2) |
|
|
197 | (3) |
|
9.5 Bitcoin and Cryptocurrencies |
|
|
200 | (7) |
|
9.5.1 Transactions and Bitcoins |
|
|
201 | (2) |
|
9.5.2 Ledger Maintenance and Mining Bitcoins |
|
|
203 | (1) |
|
9.5.3 Stability of the Bitcoin System |
|
|
204 | (3) |
|
10 Random Numbers in Cryptography |
|
|
207 | (22) |
|
|
207 | (1) |
|
10.2 Refining Physical Random Number Generators |
|
|
208 | (3) |
|
10.3 Pseudo-Random Number Generators |
|
|
211 | (2) |
|
10.4 Statistical Tests for Random and Pseudo-Random Number Generators |
|
|
213 | (3) |
|
10.5 Distinguishing Attack on Stream Ciphers |
|
|
216 | (2) |
|
10.6 Statistical Attack on Block Ciphers |
|
|
218 | (11) |
|
|
229 | (26) |
|
11.1 Purpose of Steganography |
|
|
229 | (5) |
|
11.2 Basic Methods of Data Embedding |
|
|
234 | (2) |
|
11.3 Optimal Embedding under Given Level of Distortion |
|
|
236 | (10) |
|
|
236 | (2) |
|
11.3.2 Stegosystem Based on Linear Hash Functions |
|
|
238 | (1) |
|
11.3.3 Linear Hash Functions over Binary Fields |
|
|
239 | (2) |
|
11.3.4 Potential Capacity of Stegosystems Based on Linear Hash Functions |
|
|
241 | (3) |
|
11.3.5 Methods of Constructing Stegosystems Based on Linear Hash Functions |
|
|
244 | (2) |
|
11.4 Asymptotically Optimal Perfect Stegosystems |
|
|
246 | (9) |
Answers to Problems and Exercises |
|
255 | (4) |
Bibliography |
|
259 | (10) |
Index |
|
269 | |