Atjaunināt sīkdatņu piekrišanu

E-grāmata: Understanding Cryptography: A Textbook for Students and Practitioners

4.18/5 (344 ratings by Goodreads)
  • Formāts: PDF+DRM
  • Izdošanas datums: 27-Nov-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642041013
  • Formāts - PDF+DRM
  • Cena: 39,24 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Izdošanas datums: 27-Nov-2009
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783642041013

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

Cryptography is now ubiquitous moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.





After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focuson communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.





The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the books website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

The authors' website (http://www.crypto-textbook.com/) provides extensive notes, slides, video lectures; the authors' YouTube channel (https://www.youtube.com/channel/UC1usFRN4LCMcflV7UjHNuQg) includes video lectures.

Recenzijas

From the reviews: "The authors have succeeded in creating a highly valuable introduction to the subject of applied cryptography. I hope that it can serve as a guide for practitioners to build more secure systems based on cryptography, and as a stepping stone for future researchers to explore the exciting world of cryptography and its applications." (Bart Preneel, K.U.Leuven) "The material is very well presented so it is clear to understand. The necessary amount of mathematics is used and complete yet simple examples are used by the authors to help the reader understand the topics. ... [ The authors] appear to fully understand the concepts and follow a very good pedagogical process that helps the reader not only understand the different topics but motivate you to perform some of the exercises at the end of each chapter and browse some of the reference materials. I fully recommend this book to any software developer/designer working or considering working on a project that requires security." (John Canessa) "The book presents a panoramic of modern Cryptography with a view to practical applications. ... The book is well written, many examples and figures through it illustrate the theory and the book's website offers links and supplementary information. The book also discusses the implementation in software and hardware of the main algorithms described." (Juan Tena Ayuso, Zentralblatt MATH, Vol. 1190, 2010)

Introduction to Cryptography and Data Security
1(28)
Overview of Cryptology (and This Book)
2(2)
Symmetric Cryptography
4(5)
Basics
4(2)
Simple Symmetric Encryption: The Substitution Cipher
6(3)
Cryptanalysis
9(4)
General Thoughts on Breaking Cryptosystems
9(2)
How Many Key Bits Are Enough?
11(2)
Modular Arithmetic and More Historical Ciphers
13(7)
Modular Arithmetic
13(3)
Integer Rings
16(2)
Shift Cipher (or Caesar Cipher)
18(1)
Affine Cipher
19(1)
Discussion and Further Reading
20(2)
Lessons Learned
22(2)
Problems
24(5)
Stream Ciphers
29(26)
Introduction
30(4)
Stream Ciphers vs. Block Ciphers
30(1)
Encryption and Decryption with Stream Ciphers
31(3)
Random Numbers and an Unbreakable Stream Cipher
34(7)
Random Number Generators
34(2)
The One-Time Pad
36(2)
Towards Practical Stream Ciphers
38(3)
Shift Register-Based Stream Ciphers
41(8)
Linear Feedback Shift Registers (LFSR)
41(4)
Known-Plaintext Attack Against Single LFSRs
45(1)
Trivium
46(3)
Discussion and Further Reading
49(1)
Lessons Learned
50(2)
Problems
52(3)
The Data Encryption Standard (DES) and Alternatives
55(32)
Introduction to DES
56(2)
Confusion and Diffusion
57(1)
Overview of the DES Algorithm
58(3)
Internal Structure of DES
61(8)
Initial and Final Permutation
61(1)
The f-Function
62(5)
Key Schedule
67(2)
Decryption
69(3)
Security of DES
72(3)
Exhaustive Key Search
73(2)
Analytical Attacks
75(1)
Implementation in Software and Hardware
75(2)
DES Alternatives
77(4)
The Advanced Encryption Standard (AES) and the AES Finalist Ciphers
77(1)
Triple DES (3DES) and DESX
78(1)
Lightweight Cipher Present
78(3)
Discussion and Further Reading
81(1)
Lessons Learned
82(1)
Problems
83(4)
The Advanced Encryption Standard (AES)
87(36)
Introduction
88(1)
Overview of the AES Algorithm
89(1)
Some Mathematics: A Brief Introduction to Galois Fields
90(9)
Existence of Finite Fields
90(3)
Prime Fields
93(1)
Extension Fields GF (2m)
94(1)
Addition and Subtraction in GF (2m)
95(1)
Multiplication in GF (2m)
96(2)
Inversion in GF (2m)
98(1)
Internal Structure of AES
99(11)
Byte Substitution Layer
101(2)
Diffusion Layer
103(3)
Key Addition Layer
106(1)
Key Schedule
106(4)
Decryption
110(5)
Implementation in Software and Hardware
115(1)
Discussion and Further Reading
116(1)
Lessons Learned
117(1)
Problems
118(5)
More About Block Ciphers
123(26)
Encryption with Block Ciphers: Modes of Operation
124(12)
Electronic Codebook Mode (ECB)
124(4)
Cipher Block Chaining Mode (CBC)
128(2)
Output Feedback Mode (OFB)
130(1)
Cipher Feedback Mode (CFB)
131(1)
Counter Mode (CTR)
132(2)
Galois Counter Mode (GCM)
134(2)
Exhaustive Key Search Revisited
136(1)
Increasing the Security of Block Ciphers
137(6)
Double Encryption and Meet-in-the-Middle Attack
138(2)
Triple Encryption
140(1)
Key Whitening
141(2)
Discussion and Further Reading
143(1)
Lessons Learned
144(1)
Problems
145(4)
Introduction to Public-Key Cryptography
149(24)
Symmetric vs. Asymmetric Cryptography
150(3)
Practical Aspects of Public-Key Cryptography
153(4)
Security Mechanisms
154(1)
The Remaining Problem: Authenticity of Public Keys
154(1)
Important Public-Key Algorithms
155(1)
Key Lengths and Security Levels
156(1)
Essential Number Theory for Public-Key Algorithms
157(11)
Euclidean Algorithm
157(3)
Extended Euclidean Algorithm
160(4)
Euler's Phi Function
164(2)
Fermat's Little Theorem and Euler's Theorem
166(2)
Discussion and Further Reading
168(1)
Lessons Learned
169(1)
Problems
170(3)
The RSA Cryptosystem
173(32)
Introduction
174(1)
Encryption and Decryption
174(1)
Key Generation and Proof of Correctness
175(4)
Encryption and Decryption: Fast Exponentiation
179(4)
Speed-up Techniques for RSA
183(4)
Fast Encryption with Short Public Exponents
183(1)
Fast Decryption with the Chinese Remainder Theorem
184(3)
Finding Large Primes
187(5)
How Common Are Primes?
187(1)
Primality Tests
188(4)
RSA in Practice: Padding
192(2)
Attacks
194(3)
Implementation in Software and Hardware
197(1)
Discussion and Further Reading
198(1)
Lessons Learned
199(1)
Problems
200(5)
Public-Key Cryptosystems Based on the Discrete Logarithm Problem
205(34)
Diffie-Hellman Key Exchange
206(2)
Some Algebra
208(8)
Groups
208(2)
Cyclic Groups
210(4)
Subgroups
214(2)
The Discrete Logarithm Problem
216(9)
The Discrete Logarithm Problem in Prime Fields
216(2)
The Generalized Discrete Logarithm Problem
218(1)
Attacks Against the Discrete Logarithm Problem
219(6)
Security of the Diffie-Hellman Key Exchange
225(1)
The Elgamal Encryption Scheme
226(6)
From Diffie-Hellman Key Exhange to Elgamal Encryption
226(1)
The Elgamal Protocol
227(2)
Computational Aspects
229(1)
Security
230(2)
Discussion and Further Reading
232(1)
Lessons Learned
233(1)
Problems
234(5)
Elliptic Curve Cryptosystems
239(20)
How to Compute with Elliptic Curves
239(6)
Definition of Elliptic Curves
240(2)
Group Operations on Elliptic Curves
242(3)
Building a Discrete Logarithm Problem with Elliptic Curves
245(4)
Diffie-Hellman Key Exchange with Elliptic Curves
249(2)
Security
251(1)
Implementation in Software and Hardware
252(1)
Discussion and Further Reading
253(2)
Lessons Learned
255(1)
Problems
256(3)
Digital Signatures
259(34)
Introduction
260(4)
Odd Colors for Cars, or: Why Symmetric Cryptography Is Not Sufficient
260(1)
Principles of Digital Signatures
261(2)
Security Services
263(1)
The RSA Signature Scheme
264(6)
Schoolbook RSA Digital Signature
265(2)
Computational Aspects
267(1)
Security
267(3)
The Elgamal Digital Signature Scheme
270(7)
Schoolbook Elgamal Digital Signature
270(3)
Computational Aspects
273(1)
Security
274(3)
The Digital Signature Algorithm (DSA)
277(5)
The DSA Algorithm
277(3)
Computational Aspects
280(1)
Security
281(1)
The Elliptic Curve Digital Signature Algorithm (ECDSA)
282(5)
The ECDSA Algorithm
282(3)
Computational Aspects
285(1)
Security
286(1)
Discussion and Further Reading
287(1)
Lessons Learned
288(1)
Problems
289(4)
Hash Functions
293(26)
Motivation: Signing Long Messages
294(2)
Security Requirements of Hash Functions
296(7)
Preimage Resistance or One-Wayness
297(1)
Second Preimage Resistance or Weak Collision Resistance
297(2)
Collision Resistance and the Birthday Attack
299(4)
Overview of Hash Algorithms
303(4)
Dedicated Hash Functions: The MD4 Family
304(1)
Hash Functions from Block Ciphers
305(2)
The Secure Hash Algorithm SHA-1
307(5)
Preprocessing
308(1)
Hash Computation
309(3)
Implementation
312(1)
Discussion and Further Reading
312(1)
Lessons Learned
313(2)
Problems
315(4)
Message Authentication Codes (MACs)
319(12)
Principles of Message Authentication Codes
320(1)
MACs from Hash Functions: HMAC
321(4)
MACs from Block Ciphers: CBC-MAC
325(2)
Galois Counter Message Authentication Code (GMAC)
327(1)
Discussion and Further Reading
327(1)
Lessons Learned
328(1)
Problems
329(2)
Key Establishment
331(28)
Introduction
332(4)
Some Terminology
332(1)
Key Freshness and Key Derivation
332(2)
The n2 Key Distribution Problem
334(2)
Key Establishment Using Symmetric-Key Techniques
336(6)
Key Establishment with a Key Distribution Center
336(3)
Kerberos
339(2)
Remaining Problems with Symmetric-Key Distribution
341(1)
Key Establishment Using Asymmetric Techniques
342(9)
Man-in-the-Middle Attack
342(2)
Certificates
344(3)
Public-Key Infrastructures (PKI) and CAs
347(4)
Discussion and Further Reading
351(1)
Lessons Learned
352(1)
Problems
353(6)
References 359(8)
Index 367
Prof. Dr.-Ing. Christof Paar has the Chair for Embedded Security at the University of Bochum, Germany, and is Adjunct Professor at the University of Massachusetts at Amherst, USA. Prof. Paar has taught cryptography for 15 years to engineering and computer science students in the US and in Europe, and he has taught many industrial practitioners at organizations such as Motorola, Philips and NASA. He has more than 100 publications in applied cryptography and is a cofounder of the Workshop on Cryptographic Hardware and Embedded Systems (CHES), the key academic event in this field.





Prof. Dr.-Ing. January Pelzl started his career at Bosch Telecom GmbH. He has a Ph.D. in applied cryptography, and as a researcher he investigated the practical aspects of elliptic-curve-based cryptography and cryptanalysis. He has published extensively about his theoretical and industrial work through leading international conferences and journals, and he has taught many IT security and cryptography courses in industry. He was the Managing Director of "ESCRYPT GmbH" in Bochum. Since January 2015 he is the professor of  "Computer Security" in Hochschule Hamm-Lippstadt.

The authors' website (http://www.crypto-textbook.com/) provides extensive notes, slides, video lectures; the authors' YouTube channel (https://www.youtube.com/channel/UC1usFRN4LCMcflV7UjHNuQg) includes video lectures.