Basic Methods of Cryptography

Front Cover
Cambridge University Press, Mar 12, 1998 - Computers - 229 pages
2 Reviews
This text covers the fundamentals of cryptography, which is concerned with methods of security in the storage and transportation of information. Computers are now found in every layer of society, and information is being communicated and processed automatically on a large scale. Examples include medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks. The book will be of value to advanced students and researchers involved in data protection and information processing, especially electrical engineers and people working in informatics and computer science.
 

What people are saying - Write a review

User Review - Flag as inappropriate

An Excellent book on cryptography and cryptanalysis

Contents

INTRODUCTION TO CRYPTOLOGY
1
12 Aspects of security
3
13 Cryptanalytic attacks
7
CLASSICAL CIPHER SYSTEMS
10
22 Transposition ciphers
11
23 Substitution ciphers
14
24 The Hagelin machine
18
25 Statistics and cryptanalysis
25
55 The generating function
114
56 Cryptanalysis of LFSRs
119
57 Nonlinear shift registers
124
PUBLIC KEY SYSTEMS
131
62 The RSA system
132
63 The knapsack system
143
64 Cracking the knapsack system
147
65 Public key systems based on elliptic curves
152

THE INFORMATION THEORETICAL APPROACH
37
32 The information measure and absolute security
38
33 The unicity distance
44
34 Error probability and security
48
35 Practical security
58
THE DATA ENCRYPTION STANDARD
60
42 Characteristics of the DBS
72
43 Alternative descriptions
77
44 Analysis of the DES
83
45 The modes of DES
87
46 Future of the DES
93
47 IDEA International Data Encryption Algorithm
95
SHIFT REGISTERS
98
52 The theory of finite state machines
100
53 Shift registers
102
54 Random properties of shift register sequences
106
AUTHENTICATION AND INTEGRITY
158
72 Message integrity with the aid of Hash functions
163
73 Entity authentication with symmetrical algorithm
169
74 Message authentication with a message authentication code MAC
173
75 Message authentication with digital signatures
174
76 Zeroknowledge techniques
181
KEY MANAGEMENT AND NETWORK SECURITY
191
82 Key distribution for asymmetrical systems
194
83 Key distribution for symmetrical algorithms
196
84 Network security
199
85 Fair cryptosystems
202
SHANNONS INFORMATION MEASURE
207
ENCIPHERMENT OF IMAGERY
212
BIBLIOGRAPHY
219
INDEX
226
Copyright

Other editions - View all

Common terms and phrases

Bibliographic information