# Basic Methods of Cryptography

Cambridge University Press, Mar 12, 1998 - Computers - 229 pages
This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. The book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science.

### What people are saying -Write a review

User Review - Flag as inappropriate

An Excellent book on cryptography and cryptanalysis

### Contents

 INTRODUCTION TO CRYPTOLOGY 1 12 Aspects of security 3 13 Cryptanalytic attacks 7 CLASSICAL CIPHER SYSTEMS 10 22 Transposition ciphers 11 23 Substitution ciphers 14 24 The Hagelin machine 18 25 Statistics and cryptanalysis 25
 55 The generating function 114 56 Cryptanalysis of LFSRs 119 57 Nonlinear shift registers 124 PUBLIC KEY SYSTEMS 131 62 The RSA system 132 63 The knapsack system 143 64 Cracking the knapsack system 147 65 Public key systems based on elliptic curves 152

 THE INFORMATION THEORETICAL APPROACH 37 32 The information measure and absolute security 38 33 The unicity distance 44 34 Error probability and security 48 35 Practical security 58 THE DATA ENCRYPTION STANDARD 60 42 Characteristics of the DBS 72 43 Alternative descriptions 77 44 Analysis of the DES 83 45 The modes of DES 87 46 Future of the DES 93 47 IDEA International Data Encryption Algorithm 95 SHIFT REGISTERS 98 52 The theory of finite state machines 100 53 Shift registers 102 54 Random properties of shift register sequences 106
 AUTHENTICATION AND INTEGRITY 158 72 Message integrity with the aid of Hash functions 163 73 Entity authentication with symmetrical algorithm 169 74 Message authentication with a message authentication code MAC 173 75 Message authentication with digital signatures 174 76 Zeroknowledge techniques 181 KEY MANAGEMENT AND NETWORK SECURITY 191 82 Key distribution for asymmetrical systems 194 83 Key distribution for symmetrical algorithms 196 84 Network security 199 85 Fair cryptosystems 202 SHANNONS INFORMATION MEASURE 207 ENCIPHERMENT OF IMAGERY 212 BIBLIOGRAPHY 219 INDEX 226 Copyright