This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography―--the art of making secure building blocks―--and cryptanalysis―--the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks.
This text, based on lecture notes from the author’s many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology.
The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics students. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing reasonably complete explanation of the background for some selected systems.
Author(s): Joachim von zur Gathen
Edition: 1
Publisher: Springer
Year: 2015
Language: English
Commentary: True PDF
Pages: 876
City: New York, NY
Tags: Algorithms; Cryptography; Quantum Computing; Block Ciphers; Hash Functions; RSA Cryptosystem; History; Elliptic Curves; Steganography
Front Matter....Pages 1-12
Chapter 1 Introduction....Pages 13-18
Chapter 2 Basic cryptosystems....Pages 19-60
Chapter A Classical cryptology....Pages 61-108
Chapter 3 The RSA cryptosystem....Pages 109-156
Chapter B Key addition and modular arithmetic....Pages 157-168
Chapter 4 Group cryptography and discrete logarithms....Pages 169-206
Chapter 5 Elliptic curves....Pages 207-240
Chapter C Breaking the unbreakable....Pages 241-262
Chapter 6 Differential and linear cryptanalysis....Pages 263-300
Chapter 7 Hash functions....Pages 301-320
Chapter D Codebooks....Pages 321-346
Chapter 8 Signatures....Pages 347-368
Chapter 9 Security and reductions....Pages 369-408
Chapter E Steganography....Pages 409-418
Chapter 10 Identification and authentication....Pages 419-432
Chapter F Transposition ciphers....Pages 433-446
Chapter 11 Random generation....Pages 447-498
Chapter G Some cryptographers....Pages 499-528
Chapter 12 Proof systems and zero knowledge....Pages 529-554
Chapter H People using cryptography....Pages 555-574
Chapter 13 Integral lattices....Pages 575-660
Chapter I The Zimmermann telegram....Pages 661-680
Chapter 14 Quantum computation....Pages 681-718
Chapter J ENIGMA, Turing,and COLOSSUS....Pages 719-740
Chapter 15 The computer algebra toolbox....Pages 741-806
Back Matter....Pages 807-888