Front cover image for Understanding Cryptography : a Textbook for Students and Practitioners

Understanding Cryptography : a Textbook for Students and Practitioners

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers
eBook, English, 2010
Springer-Verlag Berlin Heidelberg, Berlin, Heidelberg, 2010
1 online resource
9783642041013, 9781280385254, 9786613563170, 3642041019, 1280385251, 661356317X
1022042602
Print version:
Foreword; Preface; Acknowledgements; Table of Contents; Introduction to Cryptography and Data Security; Overview of Cryptology (and This Book); Symmetric Cryptography; Basics; Simple Symmetric Encryption: The Substitution Cipher; Cryptanalysis; General Thoughts on Breaking Cryptosystems; How Many Key Bits Are Enough?; Modular Arithmetic and More Historical Ciphers; Modular Arithmetic; Integer Rings; Shift Cipher (or Caesar Cipher); Affine Cipher; Discussion and Further Reading; Lessons Learned; Problems; Stream Ciphers; Introduction; Stream Ciphers vs. Block Ciphers. Encryption and Decryption with Stream CiphersRandom Numbers and an Unbreakable Stream Cipher; Random Number Generators; The One-Time Pad; Towards Practical Stream Ciphers; Shift Register-Based Stream Ciphers; Linear Feedback Shift Registers (LFSR); Known-Plaintext Attack Against Single LFSRs; Trivium; Discussion and Further Reading; Lessons Learned; Problems; The Data Encryption Standard (DES) and Alternatives; Introduction to DES; Confusion and Diffusion; Overview of the DES Algorithm; Internal Structure of DES; Initial and Final Permutation; The f-Function; Key Schedule; Decryption. Security of DESExhaustive Key Search; Analytical Attacks; Implementation in Software and Hardware; DES Alternatives; The Advanced Encryption Standard (AES) and the AES Finalist Ciphers; Triple DES (3DES) and DESX; Lightweight Cipher PRESENT; Discussion and Further Reading; Lessons Learned; Problems; The Advanced Encryption Standard (AES); Introduction; Overview of the AES Algorithm; Some Mathematics: A Brief Introduction to Galois Fields; Existence of Finite Fields; Prime Fields; Extension Fields GF(2m); Addition and Subtraction in GF(2m); Multiplication in GF(2m); Inversion in GF(2m). Internal Structure of AESByte Substitution Layer; Diffusion Layer; Key Addition Layer; Key Schedule; Decryption; Implementation in Software and Hardware; Discussion and Further Reading; Lessons Learned; Problems; More About Block Ciphers; Encryption with Block Ciphers: Modes of Operation; Electronic Codebook Mode (ECB); Cipher Block Chaining Mode (CBC); Output Feedback Mode (OFB); Cipher Feedback Mode (CFB); Counter Mode (CTR); Galois Counter Mode (GCM); Exhaustive Key Search Revisited; Increasing the Security of Block Ciphers; Double Encryption and Meet-in-the-Middle Attack. Triple EncryptionKey Whitening; Discussion and Further Reading; Lessons Learned; Problems; Introduction to Public-Key Cryptography; Symmetric vs. Asymmetric Cryptography; Practical Aspects of Public-Key Cryptography; Security Mechanisms; The Remaining Problem: Authenticity of Public Keys; Important Public-Key Algorithms; Key Lengths and Security Levels; Essential Number Theory for Public-Key Algorithms; Euclidean Algorithm; Extended Euclidean Algorithm; Euler's Phi Function; Fermat's Little Theorem and Euler's Theorem; Discussion and Further Reading; Lessons Learned; Problems
0-dx-doi-org.oasis.unisa.ac.za View full-text e-book at Springer. <BR> Access restricted to Unisa staff and students