Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protecting data.In the first part, this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, electronic elections and digital cash. In the second part, more advanced topics are addressed, such as the bit security of one-way functions and computationally perfect pseudorandom bit generators. The security of cryptographic schemes is a central topic. Typical examples of provably secure encryption and signature schemes and their security proofs are given. Though particular attention is given to the mathematical foundations, no special background in mathematics is presumed. The necessary algebra, number theory and probability theory are included in the appendix. Each chapter closes with a collection of exercises.The second edition contains corrections, revisions and new material, including a complete description of the AES, an extended section on cryptographic hash functions, a new section on random oracle proofs, and a new section on public-key encryption schemes that are provably secure against adaptively-chosen-ciphertext attacks.
Author(s): Delfs H., Knebl H.
Year: 2002
Language: English
Pages: 80
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография;
An Introduction to Cryptography......Page 1
How to use this guide......Page 5
Technical support......Page 6
Non-Technical and beginning technical books......Page 7
Advanced books......Page 8
Table of Contents......Page 9
What is cryptography?......Page 11
How does cryptography work?......Page 12
Caesar’s Cipher......Page 13
Public key cryptography......Page 14
How PGP works......Page 16
Keys......Page 17
Digital signatures......Page 18
Hash functions......Page 19
Digital certificates......Page 21
Checking validity......Page 23
Trust models......Page 24
Hierarchical Trust......Page 25
Levels of trust in PGP......Page 26
What is a passphrase?......Page 27
Technical details......Page 28
Why I wrote PGP......Page 29
The PGP symmetric algorithms......Page 33
About the random numbers used as session keys......Page 35
About the message digest......Page 36
How to protect public keys from tampering......Page 37
How does PGP keep track of which keys are valid?......Page 40
How to protect private keys from disclosure......Page 42
Beware of snake oil......Page 43
Compromised passphrase and private key......Page 48
Not Quite Deleted Files......Page 49
Viruses and Trojan horses......Page 50
Swap files or virtual memory......Page 51
Protecting against bogus timestamps......Page 52
Exposure on multi-user systems......Page 53
Cryptanalysis......Page 54
Glossary......Page 57
Elgamal 15......Page 77
public key tampering 49......Page 78
Zimmermann, Phil 29......Page 79