Introduction to Cryptography
Cryptography is a key technology in electronic key systems. It is used to keep data secret, digitally sign documents, access control, etc. Therefore, users should not only know how its techniques work, but they must also be able to estimate their efficiency and security. For this new edition, the author has updated the discussion of the security of encryption and signature schemes and recent advances in factoring and computing discrete logarithms. He has also added descriptions of time-memory trade of attacks and algebraic attacks on block ciphers, the Advanced Encryption Standard, the Secure Hash Algorithm, secret sharing schemes, and undeniable and blind signatures.
Modern Cryptography: Protect Your Data With Fast Block Ciphers by N. Goots
Covering the specific issues related to developing fast block ciphers using software and hardware implementation, this book provides a general picture of modern cryptography. Covered is the meaning of cryptography in informational society, including two-key cryptography, cryptographic protocols, digital electronic signatures, and several well-known single-key ciphers.
John F Dooley
A Brief History of Cryptology and Cryptographic Algorithms
The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one’s messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to finally have the upper hand. New mathematically based cryptographic algorithms that use computers for encryption and decryption are so secure that brute-force techniques seem to be the only way to break them – so far. This work traces the history of the conflict between cryptographer and cryptanalyst, explores in some depth the algorithms created to protect messages, and suggests where the field is going in the future.
Maria Isabel Gonzlez Vasco
Group Theoretic Cryptography
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future.
Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography.
Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES.
The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups.
The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption-identification protocols, key establishment, and signature schemes are covered.
The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.
Boris S. Verkhovsky
Integer Algorithms in Cryptology and Information Assurance
Integer Algorithms in Cryptology and Information Assurance is a collection of the author’s own innovative approaches in algorithms and protocols for secret and reliable communication.
Cryptography: Cracking Codes
Beginning with definitions of such basic terms as cryptanalysis, encryption, and decryption, this introduction from the Intelligence and Counterintelligence series emphasizes the point that cryptography is now a part of everyday business, not limited to espionage and the military.
Song Y. Yang
Computational Number Theory and Modern Cryptography
The only book to provide a unified view of the interplay between computational number theory and cryptography
Computational number theory and modern cryptography are two of the most important and fundamental research fields in information security.