Classical And Modern Cryptography For Beginners

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This textbook offers the knowledge and the mathematical background or techniques that are required to implement encryption/decryption algorithms or security techniques. It also provides the information on the cryptography and a cryptosystem used by organizations and applications to protect their data and users can explore classical and modern cryptography. The first two chapters are dedicated to the basics of cryptography and emphasize on modern cryptography concepts and algorithms. Cryptography terminologies such as encryption, decryption, cryptology, cryptanalysis and keys and key types included at the beginning of this textbook . The subsequent chapters cover basic phenomenon of symmetric and asymmetric cryptography with examples including the function of symmetric key encryption of websites and asymmetric key use cases. This would include security measures for websites, emails, and other types of encryptions that demand key exchange over a public network. Cryptography algorithms (Caesar cipher, Hill cipher, Playfair cipher, Vigenere cipher, DES, AES, IDEA, TEA, CAST, etc.) which are varies on algorithmic criteria like- scalability, flexibility, architecture, security, limitations in terms of attacks of adversary. They are the core consideration on which all algorithms differs and applicable as per application environment. The modern cryptography starts from invent of RSA (Rivest-Shamir-Adleman) which is an asymmetric key algorithm based on prime numbers. Nowadays it is enabled with email and digital transaction over the Internet. This textbook covers Chinese remainder theorem, Legendre, Jacobi symbol, Rabin cryptosystem, generalized ElGamal public key cryptosystem, key management, digital signatures, message authentication, differential cryptanalysis, linear cryptanalysis, time-memory trade-off attack, network security, cloud security, blockchain, bitcoin, etc. as well as accepted phenomenon under modern cryptograph. Advanced level students will find this textbook essential for course work and independent study. Computer scientists and engineers and researchers working within these related fields will also find this textbook useful.

Author(s): Rajkumar Banoth, Rekha Regar
Edition: 1
Publisher: Springer
Year: 2023

Language: English
Commentary: TruePDF
Pages: 230
Tags: Cryptology; Privacy; Mobile And Network Security; Data And Information Security

Preface
Acknowledgments
Contents
List of Figures
List of Tables
About the Authors
Abbreviations
Chapter 1: An Introduction to Classical and Modern Cryptography
1.1 Overview
1.2 Introduction to Cryptography
1.3 Cryptography Terminologies
1.4 Goals of Cryptography
1.4.1 Data Confidentiality
1.4.2 Data Integrity
1.4.3 Authentication
1.5 Analysis Criteria of Cryptography Algorithms
1.6 Classical Cryptography
1.6.1 Substitution Algorithms
1.6.1.1 Caesar Cipher
1.6.1.2 Monoalphabetic Substitution Cipher
1.6.1.3 Playfair Cipher
1.6.1.4 Hill Cipher
1.6.1.5 Vigenère Cipher
1.6.1.6 One-Time Pad
1.6.2 Transposition Algorithms
1.6.2.1 Rail Fence Cipher
1.7 Symmetric Key Algorithms
1.8 Asymmetric Key Algorithms
1.9 Common Attacks in Cryptography
1.10 The Basic Principles of Modern Cryptography
1.10.1 Principle 1 – Formulation of Exact Definitions
1.10.2 Principle 2 – Reliance on Precise Assumptions
1.10.3 Principle 3 – Rigorous Proofs of Security
Bibliography
Chapter 2: Security Standards for Classical and Modern Cryptography
2.1 Overview
2.2 Data Encryption Standard (DES)
2.2.1 Feistel Structure
2.2.2 How Does DES Work?
2.2.2.1 Why Is DES Unsafe?
2.2.2.2 DES Analysis
2.2.3 Triple DES
2.2.4 Simplified Data Encryption Standard (S-DES)
2.2.4.1 S-DES Key Generation
2.2.4.2 S-DES Encryption
2.2.5 The Switch Function
2.3 Modes of Operation
2.3.1 Electronic Code Book Mode
2.3.2 Cipher Block Chaining Mode
2.3.3 Cipher Feedback Mode
2.3.4 Output Feedback Mode
2.3.5 Counter Mode
2.4 Stream Cipher
2.5 Advanced Encryption Standard (AES)
2.5.1 High-Level Description of the AES Encryption
2.5.2 Sub-Bytes
2.5.3 Shift Rows
2.5.4 Mix-Columns
2.5.5 Add Round Key
2.5.6 AES Key Schedule
2.5.7 AES Decryption
2.5.8 Cryptanalysis of AES
2.6 Pseudo Random Number Generator (PRNG)
2.7 LFRS Based Stream Cipher
Bibliography
Chapter 3: Mathematical Foundation for Classical and Modern Cryptography
3.1 Overview
3.2 Modular Arithmetic
3.2.1 Quotient Remainder Theorem
3.2.2 Modular Addition
3.2.3 Modular Multiplication
3.2.4 Modular Division
3.2.5 Modular Inverse
3.2.6 Modular Exponentiation
3.2.7 Congruence
3.2.8 Application of Modular Arithmetic
3.2.9 Computational Complexity
3.3 Groups
3.3.1 Abelian Groups
3.3.2 Cyclic Groups
3.3.3 Rings
3.3.4 Fields
3.4 Finite Fields
3.4.1 Types of Finite Fields
3.4.2 Applications
3.5 Elliptic Curves
3.5.1 Elliptic Curve over the Real Numbers
3.5.2 Elliptic Curves over the Rational Numbers
3.5.3 Elliptic Curves over Finite Fields
3.5.4 Algorithms that Use Elliptic Curves
3.6 Elliptic Curve Cryptography
3.6.1 Elliptic Curve Cryptography Implementation
3.6.2 Elliptic Curve Cryptography Applications
3.6.3 Security
Bibliography
Chapter 4: Asymmetric Key Cryptography
4.1 Overview
4.2 Introduction to Asymmetric Key Cryptography
4.3 Applications
4.4 Hybrid Cryptosystems
4.5 Public Key Infrastructure
4.6 Weaknesses of Asymmetric Key Cryptography
4.6.1 Algorithms
4.6.2 Alteration of Public Keys
4.6.3 Public Key Infrastructure
4.7 Asymmetric Key Techniques
4.7.1 RSA
4.7.2 RC4
4.7.3 ElGamal
4.7.4 Digital Signature Algorithm
4.7.5 Diffie-Hellman Key Exchange Protocol
4.7.6 Password-Authenticated Key Agreement
4.8 Examples of Protocols Using Asymmetric Key Algorithms Include
4.8.1 S/Mime
4.8.2 PGP
4.8.3 IPSec
4.8.4 Secure Shell (SSH)
4.8.5 Transport Layer Security (TLS) and its Predecessor Secure Socket Layer (SSL)
4.8.5.1 Applications
Bibliography
Chapter 5: Modern Cryptanalysis Methods, Advanced Network Attacks and Cloud Security
5.1 Overview
5.1.1 Cryptanalysis
5.2 Types of Cryptanalysis Systems
5.2.1 Linear Cryptanalysis
5.2.2 Differential Cryptanalysis
5.3 Difference Between Linear and Differential Cryptanalysis
5.4 Types of Cryptanalytic Attacks
5.5 Network Security: Common and Advanced Network Attacks
5.5.1 Reconnaissance Attacks
5.5.2 Access Attacks
5.5.3 Social Engineering Attack
5.5.4 DoS Attack and DDoS Attack
5.5.5 Common IPv4 and IPv6 Attacks
5.5.6 TCP and UDP Vulnerabilities
5.5.7 IP Services Vulnerabilities
5.5.8 DNS Attacks
5.6 Cloud Security
5.7 Introduction to Blockchain and Bitcoin
5.7.1 Blockchain
5.7.2 Bitcoin
Bibliography