## Basic Methods of CryptographyThis text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. The book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science. |

### What people are saying - Write a review

User Review - Flag as inappropriate

An Excellent book on cryptography and cryptanalysis

### Contents

INTRODUCTION TO CRYPTOLOGY | 1 |

12 Aspects of security | 3 |

13 Cryptanalytic attacks | 7 |

CLASSICAL CIPHER SYSTEMS | 10 |

22 Transposition ciphers | 11 |

23 Substitution ciphers | 14 |

24 The Hagelin machine | 18 |

25 Statistics and cryptanalysis | 25 |

55 The generating function | 114 |

56 Cryptanalysis of LFSRs | 119 |

57 Nonlinear shift registers | 124 |

PUBLIC KEY SYSTEMS | 131 |

62 The RSA system | 132 |

63 The knapsack system | 143 |

64 Cracking the knapsack system | 147 |

65 Public key systems based on elliptic curves | 152 |

THE INFORMATION THEORETICAL APPROACH | 37 |

32 The information measure and absolute security | 38 |

33 The unicity distance | 44 |

34 Error probability and security | 48 |

35 Practical security | 58 |

THE DATA ENCRYPTION STANDARD | 60 |

42 Characteristics of the DBS | 72 |

43 Alternative descriptions | 77 |

44 Analysis of the DES | 83 |

45 The modes of DES | 87 |

46 Future of the DES | 93 |

47 IDEA International Data Encryption Algorithm | 95 |

SHIFT REGISTERS | 98 |

52 The theory of finite state machines | 100 |

53 Shift registers | 102 |

54 Random properties of shift register sequences | 106 |

AUTHENTICATION AND INTEGRITY | 158 |

72 Message integrity with the aid of Hash functions | 163 |

73 Entity authentication with symmetrical algorithm | 169 |

74 Message authentication with a message authentication code MAC | 173 |

75 Message authentication with digital signatures | 174 |

76 Zeroknowledge techniques | 181 |

KEY MANAGEMENT AND NETWORK SECURITY | 191 |

82 Key distribution for asymmetrical systems | 194 |

83 Key distribution for symmetrical algorithms | 196 |

84 Network security | 199 |

85 Fair cryptosystems | 202 |

SHANNONS INFORMATION MEASURE | 207 |

ENCIPHERMENT OF IMAGERY | 212 |

219 | |

226 | |

### Other editions - View all

### Common terms and phrases

64 bits Alice alphabet assume BCDA binary blocks calculate CDAB characteristic polynomial cipher system ciphertext code wheels columns Consider corresponding cryptanalyst cryptographic cryptographic algorithms DABC deciphered decipherment decrypted denoted digital signatures elements elliptic curve enciphered encipherment encrypted equal error probability example expansion operation F G H feedback function Figure finding the key given Hash function information measure initial permutation input bits instance integers intruder key distribution centre key equivocation key management knapsack length letters LFSR matrix Message authentication method modulo number of possible number of sections one-way function output bits output sequence Pe(KIC period pixels plaintext polyalphabetical substitution prime number primitive polynomial protocol pseudorandom sequences public key public key systems random number residual classes RSA system S-box secret key shift register so-called subkeys substitution cipher super-increasing sequence symmetrical algorithms Table Theorem total number transposition cipher unicity distance vector