Text
Modern cryptography: theory and practice
Many cryptographic schemes and protocols, especially those based on public-keycryptography, have basic or so-called "textbook crypto" versions, as these versionsare usually the subjects for many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It explains why "textbook crypto" isonly good in an ideal world where data are random and bad guys behave nicely.It reveals the general unfitness of "textbook crypto" for the real world by demonstratingnumerous attacks on such schemes, protocols and systems under variousreal-world application scenarios. This book chooses to introduce a set of practicalcryptographic schemes, protocols and systems, many of them standards or de factoones, studies them closely, explains their working principles, discusses their practicalusages, and examines their strong (i.e., fit-for-application) security properties, oftenwith security evidence formally established. The book also includes self-containedtheoretical background material that is the foundation for modern cryptography.
Contents:
Part I: Introduction
Chapter 1. Beginning with a Simple Communication Game
Chapter 2. Wrestling Between Safeguard and Attack
Part II: Mathematical Foundations: Standard Notation Chapter 3. Probability and Information Theory
Chapter 4. Computational Complexity
Chapter 5. Algebraic Foundations
Chapter 6. Number Theory
Part III: Basic Cryptographic Techniques
Chapter 7. Encryption — Symmetric Techniques
Chapter 8. Encryption — Asymmetric Techniques
Chapter 9. In An Ideal World: Bit Security of The Basic Public-Key Cryptographic Functions
Chapter 10. Data Integrity Techniques
Part IV: Authentication
Chapter 11. Authentication Protocols — Principles
Chapter 12. Authentication Protocols — The Real World
Chapter 13. Authentication Framework for Public-Key Cryptography
Part V: Formal Approaches to Security Establishment
Chapter 14. Formal and Strong Security Definitions for Public-Key Cryptosystems
Chapter 15. Provably Secure and Efficient Public-Key Cryptosystems
Chapter 16. Strong and Provable Security for Digital Signatures
Chapter 17. Formal Methods for Authentication Protocols Analysis
Part VI: Cryptographic Protocols
Chapter 18. Zero-Knowledge Protocols
Chapter 19. Returning to "Coin Flipping Over Telephone"
Chapter 20. Afterremark
No other version available