Introduction to Cryptography with Coding Theory

Wade Trappe, Lawrence C. Washington

  • 出版商: Prentice Hall
  • 出版日期: 2002-01-15
  • 售價: $1,068
  • 語言: 英文
  • 頁數: 504
  • 裝訂: Hardcover
  • ISBN: 0130618144
  • ISBN-13: 9780130618146
  • 相關分類: 資訊安全
  • 無法訂購

買這商品的人也買了...

相關主題

商品描述

For advanced undergraduate courses in cryptography and network security in departments of math and computer science.

Assumes a minimal background in programming and a level of math sophistication equivalent to a course in linear algebra.

Table of Contents

Preface.
1. Overview.

Secure Communications. Cryptographic Applications.


2. Classical Cryptosystems.

Shift Ciphers. Affine Ciphers. The Vingenere Cipher. Substitution Ciphers. Sherlock Holmes. The Playfair and ADFGX Ciphers. Block Ciphers. Binary Numbers and ASCII. One-Time Pads. Pseudo-random Bit Generation. Linear Feedback Shift Register Sequences. Enigma. Exercises. Computer Problems.


3. Basic Number Theory.

Basic Notions. Solving ax + by = d. Congruences. The Chinese Remainder Theorem. Modular Exponentiation. Fermat and Euler. Primitive Roots. Inverting Matrices Mod n. Square Roots Mod n. Finite Fields. Exercises. Computer Problems.


4. The Data Encryption Standard.

Introduction. A Simplified DES-Type Algorithm. Differential Cryptoanalysis. DES. Modes of Operation. Breaking DES. Password Security. Exercises.


5. AES: Rijndael.

The Basic Algorithm. The Layers. Decryption. Design Considerations.


6. The RSA Algorithm.

The RSA Algorithm. Attacks on RSA. Primality Testing. Factoring. The RSA Challenge. An Application to Treaty Verification. The Public Key Concept. Exercises. Computer Problems.


7. Discrete Logarithms.

Discrete Logarithms. Computing Discrete Logs. Bit Commitment. The ElGamal Public Key Cryptosystem. Exercise. Computer Problems.


8. Digital Signatures.

RSA Signatures. The ElGamal Signature Scheme. Hash Functions. Birthday Attacks. The Digital Signature Algorithm. Exercises. Computer Problems.


9. E-Commerce and Digital Cash.

Secure Electronic Transaction. Digital Cash. Exercises.


10. Secret Sharing Schemes.

Secret Splitting. Threshold Schemes. Exercises. Computer Problems.


11. Games.

Flipping Coins over the Telephone. Poker over the Telephone. Exercises.


12. Zero Knowledge Techniques.

The Basic Setup. Feige-Fiat-Shamir Identification Scheme. Exercises.


13. Key Establishment Protocols.

Key Agreement Protocols. Key Pre-distribution. Key Distribution. Public Key Infrastructures (PKI). Exercises.


14. Information Theory.

Probability Theory. Entropy. Huffman Codes. Perfect Secrecy. The Entropy of English. Exercises.


15. Elliptic Curves.

The Addition Law. Elliptic Curves Mod n. Factoring with Elliptic Curves. Elliptic Curves in Characteristic 2. Elliptic Curve Cryptosystems. Exercises. Computer Systems.


16. Error Correcting Codes.

Introduction. Error Correcting Codes. Bounds on General Codes. Linear Codes. Hamming Codes. Golay Codes. Cyclic Codes. BCH Codes. Reed-Solomon Codes. The McEliece Cryptosystem. Other Topics. Exercises. Computer Problems.


17. Quantum Cryptography.

A Quantum Experiment. Quantum Key Distribution. Shor's Algorithm. Exercises.


Appendix A: Mathematica.

Getting Started with Mathematica. Some Commands. Examples for Chapter 2. Examples for Chapter 3. Examples for Chapter 6. Examples for Chapter 8. Examples for Chapter 10. Examples for Chapter 11. Examples for Chapter 15.


Appendix B: Maple.

Getting Started with Maple. Some Commands. Examples for Chapter 2. Examples for Chapter 3. Examples for Chapter 6. Examples for Chapter 8. Examples for Chapter 10. Examples for Chapter 11. Examples for Chapter 15.


Appendix C: Matlab.

Getting Started with MATLAB. Examples for Chapter 2. Examples for Chapter 3. Examples for Chapter 6. Examples for Chapter 8. Examples for Chapter 10. Examples for Chapter 11. Examples for Chapter 15.


Appendix D: Further Reading.
Bibliography.
Index.