Preface |
|
xi | |
|
1 Introduction to Cryptology |
|
|
1 | (6) |
|
|
2 | (1) |
|
1.2 Cryptology in Practice |
|
|
2 | (2) |
|
1.3 Why Study Cryptology? |
|
|
4 | (3) |
|
|
7 | (22) |
|
2.1 Keyword Substitution Ciphers |
|
|
7 | (4) |
|
2.1.1 Simple Keyword Substitution Ciphers |
|
|
8 | (1) |
|
2.1.2 Keyword Columnar Substitution Ciphers |
|
|
9 | (1) |
|
|
10 | (1) |
|
2.2 Cryptanalysis of Substitution Ciphers |
|
|
11 | (8) |
|
|
17 | (2) |
|
|
19 | (3) |
|
|
21 | (1) |
|
|
22 | (7) |
|
|
27 | (2) |
|
|
29 | (18) |
|
3.1 Columnar Transposition Ciphers |
|
|
29 | (7) |
|
3.1.1 Simple Columnar Transposition Ciphers |
|
|
30 | (2) |
|
3.1.2 Keyword Columnar Transposition Ciphers |
|
|
32 | (2) |
|
|
34 | (2) |
|
3.2 Cryptanalysis of Transposition Ciphers |
|
|
36 | (5) |
|
3.2.1 Cryptanalysis of Simple Columnar Ciphers |
|
|
36 | (2) |
|
3.2.2 Cryptanalysis of Keyword Columnar Ciphers |
|
|
38 | (2) |
|
|
40 | (1) |
|
3.3 ADFGX and ADFGVX Ciphers |
|
|
41 | (6) |
|
|
44 | (3) |
|
|
47 | (36) |
|
4.1 The Enigma Cipher Machine |
|
|
47 | (18) |
|
|
61 | (4) |
|
|
65 | (10) |
|
4.2.1 The Multiplication Principle |
|
|
65 | (2) |
|
|
67 | (3) |
|
|
70 | (2) |
|
|
72 | (3) |
|
4.3 Security of the Enigma Machine |
|
|
75 | (8) |
|
4.3.1 Number of Initial Configurations |
|
|
75 | (3) |
|
4.3.2 Background on Cryptanalysis |
|
|
78 | (3) |
|
|
81 | (2) |
|
|
83 | (84) |
|
|
83 | (7) |
|
|
88 | (2) |
|
5.2 Loops and Logical Inconsistencies |
|
|
90 | (2) |
|
|
92 | (1) |
|
5.3 Searching for the Correct Configuration |
|
|
92 | (22) |
|
|
106 | (8) |
|
|
114 | (10) |
|
|
120 | (4) |
|
|
124 | (15) |
|
|
130 | (9) |
|
|
139 | (11) |
|
|
143 | (7) |
|
|
150 | (14) |
|
|
155 | (9) |
|
|
164 | (3) |
|
|
166 | (1) |
|
6 Shift and Afflne Ciphers |
|
|
167 | (28) |
|
|
167 | (11) |
|
|
176 | (2) |
|
|
178 | (5) |
|
|
181 | (2) |
|
6.3 Cryptanalysis of Shift Ciphers |
|
|
183 | (4) |
|
|
185 | (2) |
|
|
187 | (3) |
|
|
189 | (1) |
|
6.5 Cryptanalysis of Affine Ciphers |
|
|
190 | (5) |
|
|
192 | (3) |
|
7 Alberti and Vigenere Ciphers |
|
|
195 | (54) |
|
|
196 | (5) |
|
|
199 | (2) |
|
|
201 | (6) |
|
7.2.1 Vigenere Autokey Ciphers |
|
|
201 | (3) |
|
7.2.2 Vigenere Keyword Ciphers |
|
|
204 | (1) |
|
|
205 | (2) |
|
|
207 | (8) |
|
|
213 | (2) |
|
|
215 | (9) |
|
7.4.1 The Index of Coincidence |
|
|
216 | (4) |
|
7.4.2 Estimating the Keyword Length |
|
|
220 | (2) |
|
|
222 | (2) |
|
|
224 | (2) |
|
|
225 | (1) |
|
7.6 Cryptanalysis of Vigenere Keyword Ciphers |
|
|
226 | (23) |
|
7.6.1 Finding the Keyword Length Using Signatures |
|
|
228 | (5) |
|
7.6.2 Finding the Keyword Letters Using Scrawls |
|
|
233 | (4) |
|
|
237 | (12) |
|
|
249 | (34) |
|
|
249 | (17) |
|
8.1.1 Definition and Basic Terminology |
|
|
250 | (1) |
|
|
251 | (5) |
|
8.1.3 Identity and Inverse Matrices |
|
|
256 | (3) |
|
8.1.4 Matrices with Modular Arithmetic |
|
|
259 | (3) |
|
|
262 | (4) |
|
|
266 | (9) |
|
|
273 | (2) |
|
8.3 Cryptanalysis of Hill Ciphers |
|
|
275 | (8) |
|
|
279 | (4) |
|
|
283 | (40) |
|
9.1 Introduction to Public-Key Ciphers |
|
|
283 | (3) |
|
|
285 | (1) |
|
9.2 Introduction to RSA Ciphers |
|
|
286 | (3) |
|
|
289 | (1) |
|
9.3 The Euclidean Algorithm |
|
|
289 | (7) |
|
|
294 | (2) |
|
9.4 Modular Exponentiation |
|
|
296 | (5) |
|
|
301 | (1) |
|
|
301 | (2) |
|
|
302 | (1) |
|
|
303 | (6) |
|
|
307 | (2) |
|
9.7 Cryptanalysis of RSA Ciphers |
|
|
309 | (5) |
|
|
312 | (2) |
|
|
314 | (4) |
|
|
317 | (1) |
|
9.9 Integer Factorization |
|
|
318 | (3) |
|
|
321 | (1) |
|
9.10 The RSA Factoring Challenges |
|
|
321 | (2) |
|
|
322 | (1) |
|
|
323 | (22) |
|
10.1 The Diffie-Hellman Key Exchange |
|
|
324 | (4) |
|
|
326 | (2) |
|
|
328 | (3) |
|
|
330 | (1) |
|
|
331 | (8) |
|
|
337 | (2) |
|
10.4 Cryptanalysis of ElGamal Ciphers |
|
|
339 | (6) |
|
|
343 | (2) |
|
11 The Advanced Encryption Standard |
|
|
345 | (54) |
|
11.1 Representations of Numbers |
|
|
345 | (9) |
|
|
346 | (3) |
|
|
349 | (3) |
|
|
352 | (2) |
|
|
354 | (6) |
|
|
358 | (2) |
|
|
360 | (11) |
|
|
361 | (1) |
|
|
362 | (2) |
|
11.3.3 Key Format and Generation |
|
|
364 | (6) |
|
|
370 | (1) |
|
|
371 | (12) |
|
|
372 | (1) |
|
|
373 | (7) |
|
|
380 | (3) |
|
|
383 | (13) |
|
|
393 | (3) |
|
|
396 | (3) |
|
|
397 | (2) |
|
12 Message Authentication |
|
|
399 | (36) |
|
|
400 | (9) |
|
|
406 | (3) |
|
|
409 | (8) |
|
|
414 | (3) |
|
12.3 RSA Signatures with Hashing |
|
|
417 | (6) |
|
|
420 | (3) |
|
12.4 The Man-in-the-Middle Attack |
|
|
423 | (3) |
|
|
425 | (1) |
|
12.5 Public-Key Infrastructures |
|
|
426 | (9) |
|
|
427 | (1) |
|
|
428 | (1) |
|
12.5.3 X.509 Certificates |
|
|
429 | (3) |
|
|
432 | (3) |
Bibliography |
|
435 | (2) |
Hints and Answers for Selected Exercises |
|
437 | (32) |
Index |
|
469 | |