Practical Mathematical Cryptography

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Practical Mathematical Cryptography provides a clear and accessible introduction to practical mathematical cryptography.

Cryptography, both as a science and as practice, lies at the intersection of mathematics and the science of computation, and the presentation emphasises the essential mathematical nature of the computations and arguments involved in cryptography.


Cryptography is also a practical science, and the book shows how modern cryptography solves important practical problems in the real world, developing the theory and practice of cryptography from the basics to secure messaging and voting.


The presentation provides a unified and consistent treatment of the most important cryptographic topics, from the initial design and analysis of basic cryptographic schemes towards applications.


Features




    • Builds from theory toward practical applications

    • Suitable as the main text for a mathematical cryptography course

    • Focus on secure messaging and voting systems.

    Author(s): Kristian Gjøsteen
    Series: Chapman & Hall/CRC Cryptography and Network Security Series
    Edition: 1
    Publisher: Chapman and Hall/CRC
    Year: 2022

    Language: English
    Tags: Cryptography; Symmetric Cryptography; Key Exchange; Diffie-Hellman Protocol; Public Key Encryption; Digital Signatures; Quantum Computation; Symmetric Cryptography

    Cover
    Half Title
    Series Page
    Title Page
    Copyright Page
    Contents
    Preface
    CHAPTER 1: Symmetric Cryptography
    1.1. DEFINITIONS
    1.2. CONFIDENTIALITY AGAINST EAVESDROPPERS
    1.3. INTEGRITY
    1.4. CONFIDENTIALITY AND INTEGRITY
    1.5. THE KEY DISTRIBUTION PROBLEM
    CHAPTER 2: Key Exchange and Diffie-Hellman
    2.1. THE DIFFIE-HELLMAN PROTOCOL
    2.2. DISCRETE LOGARITHMS
    2.3. PRIMALITY TESTING
    2.4. FINITE FIELDS
    2.5. ELLIPTIC CURVES
    2.6. ACTIVE ATTACKS
    CHAPTER 3: Public Key Encryption
    3.1. DEFINITIONS
    3.2. SCHEMES BASED ON DIFFIE-HELLMAN
    3.3. RSA
    3.4. FACTORING INTEGERS
    3.5. LATTICES
    3.6. LATTICE-BASED CRYPTOSYSTEMS
    3.7. LATTICE ALGORITHMS
    3.8. THE PUBLIC KEY INFRASTRUCTURE PROBLEM
    CHAPTER 4: Digital Signatures
    4.1. DEFINITIONS
    4.2. HASH FUNCTIONS
    4.3. RSA SIGNATURES
    4.4. SCHNORR SIGNATURES
    4.5. HASH-BASED SIGNATURES
    4.6. SECURING DIFFIE-HELLMAN
    4.7. THE PUBLIC KEY INFRASTRUCTURE PROBLEM
    CHAPTER 5: Factoring Using Quantum Computers
    5.1. BACKGROUND
    5.2. QUANTUM COMPUTATION
    5.3. FACTORING USING A QUANTUM COMPUTER
    CHAPTER 6: Computational Problems
    6.1. DEFINITIONS
    6.2. STATISTICAL DISTANCE
    6.3. DIFFIE-HELLMAN
    6.4. RSA
    6.5. LATTICE PROBLEMS
    CHAPTER 7: Symmetric Cryptography
    7.1. DEFINING SECURITY
    7.2. CONFIDENTIALITY AND UNDERLYING PRIMITIVES
    7.3. MESSAGE AUTHENTICATION CODES
    7.4. CHANNELS
    7.5. HASH FUNCTIONS
    7.6. IDEAL MODELS
    CHAPTER 8: Public Key Encryption
    8.1. DEFINING SECURITY
    8.2. KEY ENCAPSULATION MECHANISMS
    8.3. HOMOMORPHIC ENCRYPTION
    8.4. COMMITMENT SCHEMES
    8.5. CRYPTOGRAPHIC VOTING
    CHAPTER 9: Digital Signatures
    9.1. DEFINING SECURITY
    9.2. HASH AND SIGN PARADIGM
    9.3. IDENTIFICATION SCHEMES
    9.4. MESSAGING
    CHAPTER 10: Key Exchange
    10.1. KEY EXCHANGE PROTOCOLS
    10.2. DEFINING SECURITY
    10.3. KEY EXCHANGE FROM KEY ENCAPSULATION
    10.4. SINGLE-MESSAGE KEY EXCHANGE
    10.5. SINGLE-SIDED AUTHENTICATION
    10.6. CONTINUOUS KEY EXCHANGE
    CHAPTER 11: Arguments
    11.1. ARGUMENTS
    11.2. NON-INTERACTIVE ARGUMENTS
    11.3. USING HVZK
    11.4. FURTHER USEFUL ARGUMENTS
    CHAPTER 12: Multi-party Computation
    12.1. SECRET SHARING
    12.2. MULTI-PARTY COMPUTATION
    12.3. DISTRIBUTED DECRYPTION
    CHAPTER 13: Messaging Protocols
    13.1. MESSAGING PROTOCOLS
    13.2. DEFINING SECURITY
    13.3. INVASIVE ADVERSARIES
    13.4. SOMEWHAT ANONYMOUS MESSAGING
    CHAPTER 14: Cryptographic Voting
    14.1. DEFINITIONS
    14.2. HOW TO USE A VOTING SCHEME
    14.3. CAST AS INTENDED
    14.4. COERCION RESISTANCE
    Index