Continuing a bestselling tradition, An Introduction to Cryptography, Second Edition features all of the requisite background material on number theory and algorithmic complexity, includes a historical look at the field, and offers updated and expanded exercise sets. In addition to updates throughout the text, this edition includes two new chapters on current and future applications that cover topics such as electronic mail, Internet security, protocol layers and SSL, firewalls, client-server model and cookies, network security, wireless security, smart cards, and biometrics. The book also provides additional information on cryptanalysis and primality testing as well as appendices on DES and primitive roots.
Author(s): Richard A. Mollin
Series: Discrete mathematics and its applications
Edition: 2nd ed
Publisher: Chapman & Hall/CRC
Year: 2007
Language: English
Pages: 393
City: Boca Raton
c6188fm......Page 1
1.1 Divisibility......Page 11
1.2 Primes, Primality Testing, and Induction......Page 16
1.3 An Introduction to Congruences......Page 27
1.4 Euler, Fermat, and Wilson......Page 45
1.5 Primitive Roots......Page 54
1.6 The Index Calculus and Power Residues......Page 61
1.7 Legendre, Jacobi, & Quadratic Reciprocity......Page 68
1.8 Complexity......Page 77
Bibliography......Page 0
2.1 Definitions and Illustrations......Page 89
2.2 Classic Ciphers......Page 101
2.3 Stream Ciphers......Page 119
2.4 LFSRs......Page 125
2.5 Modes of Operation......Page 132
2.6 Attacks......Page 137
3.1 S-DES and DES......Page 141
3.2 AES......Page 162
4.1 The Ideas Behind PKC......Page 167
4.2 Digital Envelopes and PKCs......Page 175
(II) RSA Public-Key Cipher......Page 182
(II) ElGamal Public-Key Cipher......Page 191
4.5 DSA — The DSS......Page 197
5.1 True Primality Tests......Page 199
5.2 Probabilistic Primality Tests......Page 208
5.3 Recognizing Primes......Page 214
6.1 Classical Factorization Methods......Page 217
6.2 The Continued Fraction Algorithm......Page 221
6.3 Pollard’s Algorithms......Page 224
6.4 The Quadratic Sieve......Page 227
6.5 The Elliptic Curve Method (ECM)......Page 230
7.1 History of the Internet and the WWW......Page 233
7.2 Pretty Good Privacy (PGP)......Page 237
7.3 Protocol Layers and SSL......Page 251
7.4 Internetworking and Security — Firewalls......Page 260
What Firewalls Cannot Do......Page 261
7.5 Client–Server Model and Cookies......Page 269
8.1 Login and Network Security......Page 273
Attacks on Passwords......Page 274
Ethernet and Promiscuous Mode......Page 276
Packet Sni.er Components......Page 277
Token Applications......Page 278
Basically, How Does SSH work?......Page 279
Key Exchange Protocol......Page 280
Connection......Page 281
Exercises......Page 282
Virus Targets......Page 283
Types of Viruses......Page 285
Examples......Page 286
Virus Detection and Prevention......Page 288
Advanced Protection......Page 289
DIS Closed-Loop Process......Page 290
8.3 Smart Cards......Page 296
8.4 Biometrics......Page 304
Exercises......Page 307
Appendix A: Fundamental Facts......Page 308
Appendix B: Computer Arithmetic......Page 335
Appendix C: The Rijndael S-Box......Page 345
Appendix D: Knapsack Ciphers......Page 347
Appendix E: Silver-Pohlig-Hellman Algorithm......Page 354
Appendix F: SHA-1......Page 356
Appendix G: Radix-64 Encoding......Page 360
Appendix H: Quantum Cryptography......Page 362
Section 1.1......Page 368
Section 1.2......Page 369
Section 1.3......Page 370
Section 1.4......Page 372
Section 1.6......Page 375
Section 1.7......Page 376
Section 2.1......Page 377
Section 2.2......Page 378
Section 2.4......Page 379
Section 4.2......Page 380
Section 4.3......Page 381
Section 5.1......Page 382
Section 5.2......Page 383
Section 6.2......Page 384
Section 8.4......Page 385
Bibliography......Page 386
About the Author......Page 393