Contemporary cryptography

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Oppliger, Rolf (VerfasserIn)
Format: Buch
Sprache:English
Veröffentlicht: Boston [u.a.] Artech House 2011
Ausgabe:2. ed.
Schriftenreihe:artech house information security and privacy series
Schlagworte:
Online-Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a22000002c 4500
001 BV039161752
003 DE-604
005 20120131
007 t|
008 110727s2011 xx |||| 00||| eng d
010 |a 2005043576 
020 |a 9781608071456  |9 978-1-60807-145-6 
035 |a (OCoLC)745529997 
035 |a (DE-599)BSZ341272604 
040 |a DE-604  |b ger 
041 0 |a eng 
049 |a DE-91  |a DE-12  |a DE-898 
084 |a ST 276  |0 (DE-625)143642:  |2 rvk 
084 |a 24,1  |2 ssgn 
084 |a DAT 465f  |2 stub 
100 1 |a Oppliger, Rolf  |e Verfasser  |0 (DE-588)1019191988  |4 aut 
245 1 0 |a Contemporary cryptography  |c Rolf Oppliger 
250 |a 2. ed. 
264 1 |a Boston [u.a.]  |b Artech House  |c 2011 
300 |a XXV, 571 S. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 0 |a artech house information security and privacy series 
500 |a Includes bibliographical references and index 
650 4 |a Cryptography 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |8 1\p  |0 (DE-588)4123623-3  |a Lehrbuch  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
856 4 2 |m Digitalisierung BSB Muenchen  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024179230&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
883 1 |8 1\p  |a cgwrk  |d 20201028  |q DE-101  |u https://d-nb.info/provenance/plan#cgwrk 
943 1 |a oai:aleph.bib-bvb.de:BVB01-024179230 

Datensatz im Suchindex

DE-BY-TUM_call_number 0002 DAT 465f 2011 A 6270(2)
DE-BY-TUM_katkey 1776663
DE-BY-TUM_location 00
DE-BY-TUM_media_number 040007458128
_version_ 1820897931756044288
adam_text Contents Foreword xv Preface xix Acknowledgments xxv Chapter 1 Introduction 1 1.1 Cryptology 1 1.2 Cryptographic Systems 4 1.2.1 Classes of Cryptographic Systems 8 1.2.2 Secure Cryptographic Systems 8 1.2.3 Real Security of Secure Cryptosystems 15 1.3 Historical Background Information 18 1.4 Outline of the Book 20 References 22 Chapter 2 Cryptographic Systems 25 2.1 Unkeyed Cryptosystems 25 2.1.1 One-Way Functions 25 2.1.2 Cryptographic Hash Functions 27 2.1.3 Random Bit Generators 29 2.2 Secret Key Cryptosystems 31 2.2.1 Symmetric Encryption Systems 31 2.2.2 Message Authentication Codes 33 2.2.3 PRBGs 35 2.2.4 PRFs 36 2.3 Public Key Cryptosystems 37 2.3.1 Asymmetric Encryption Systems 37 2.3.2 DSSs 40 2.3.3 Key Agreement 44 2.3.4 Entity Authentication 46 VII Contemporary Cryptography 2.3.5 Secure Multiparty Computation 46 2.4 Final Remarks 47 References 47 I UNKEYED CRYPTOSYSTEMS 49 Chapter 3 One-Way Functions 51 3.1 Introduction 51 3.2 Candidate One-Way Functions 54 3.2.1 Discrete Exponentiation Function 55 3.2.2 RSA Function 59 3.2.3 Modular Square Function 61 3.3 Integer Factorization Algorithms 63 3.3.1 Special-Purpose Algorithms 63 3.3.2 General-Purpose Algorithms 67 3.3.3 State of the Art 69 3.4 Algorithms for Computing Discrete Logarithms 71 3.4.1 Generic Algorithms 71 3.4.2 Nongeneric (Special-Purpose) Algorithms 74 3.4.3 State of the Art 75 75 77 ■ 82 83 87 87 91 93 96 101 103 105 References 109 Chapter 5 Random Bit Generators 113 5.1 Introduction 113 5.2 Realizations and Implementations 115 5.2.1 Hardware-Based Random Bit Generators 115 5.2.2 Software-Based Random Bit Generators 116 3.5 Hard-Core Predicates 3.6 Elliptic Curve Cryptography 3.7 Final Remarks References Chapter 4 Cryptographic Hash Functions 4.1 Introduction 4.2 Merkle-Damgård Construction 4.3 Exemplary Cryptographic Hash Functions 4.3.1 MD4 4.3.2 MD5 4.3.3 SHA-1 4.4 Final Remarks Contents ix 5.2.3 Deskewing Techniques 117 5.3 Statistical Randomness Testing 118 5.4 Final Remarks 120 References 120 II SECRET KEY CRYPTOSYSTEMS 123 Chapter 6 Symmetric Encryption Systems 125 6.1 Introduction 125 6.1.1 Examples 126 6.1.2 Classes of Symmetric Encryption Systems 129 6.1.3 Secure Symmetric Encryption Systems 130 6.1.4 Evaluation Criteria 133 6.2 Block Ciphers 134 6.2.1 DES 136 6.2.2 AES 155 6.2.3 Modes of Operation 171 6.3 Stream Ciphers 181 6.3.1 LFSR-Based Stream Ciphers 182 6.3.2 Other Stream Ciphers 184 6.4 Perfectly Secure Encryption 187 6.5 Final Remarks 192 References 194 Chapter 7 Message Authentication Codes 197 7.1 Introduction 197 7.2 Computationally Secure MACs 200 7.2.1 MACs Using Symmetric Encryption Systems 201 7.2.2 MACs Using Keyed Hash Functions 203 7.2.3 MACs Using PRFs 207 7.2.4 MACs Based on Universal Hashing 211 7.3 Information-Theoretically Secure MACs 212 7.4 Final Remarks 214 References 215 Chapter 8 Pseudorandom Bit Generators 217 8.1 Introduction 217 8.2 Exemplary Constructions 219 8.3 Cryptographically Secure PRBGs 222 8.3.1 BIum-Micali PRBG 225 Contemporary Cryptography 8.3.2 RSAPRBG 225 8.3.3 BBSPRBG 226 8.4 Final Remarks 227 References 228 Chapter 9 Pseudorandom Functions 231 9. 1 introduction 231 9.2 Constructions 235 9.2.1 PRF-Based PRBG 235 9.2.2 PRBG-Based PRF 236 9.3 Random Oracle Model 237 9.4 Final Remarks 239 References 239 III PUBLIC KEY CRYPTOSYSTEMS 241 Chapter 10 Asymmetric Encryption Systems 243 10.1 Introduction 243 10.2 Basic Systems 248 10.2.1 RSA 248 10.2.2 Rabin 260 10.2.3 Elgamal 266 1 0.3 Secure Systems 273 10.3.1 Probabilistic Encryption 273 10.3.2 Optimal Asymmetric Encryption Padding 276 10.3.3 Cramer-Shoup 281 10.4 Identity-Based Encryption 284 10.5 Homomorphic Encryption 286 10.6 Final Remarks 287 References 288 Chapter 11 Digital Signature Systems 291 11.1 Introduction 291 11.2 Basic Systems 295 11.2.1 RSA 295 11.2.2 Rabin 301 11.2.3 Elgamal 303 11.2.4 Schnorr 309 11.2.5 DSA 311 11.2.6 ECDSA 316 Contents xi ИЗ Provably Secure Systems 317 11.3.1 GMR 319 11.3.2 PSSandPSS-R 320 11.3.3 Cramer-Shoup 325 11.3.4 Gennaro-Halevi-Rabin 327 11.4 Identity-Based Signatures 328 11.5 One-Time Signatures 329 11.6 Digital Signatures for Streams 332 11.7 Variants 336 11.7.1 Blind Signatures 336 11.7.2 Undeniable Signatures 337 11.7.3 Fail-Stop Signatures 338 11.7.4 Group Signatures 338 11.8 Final Remarks 338 References 339 Chapter 12 Key Establishment 343 12.1 Introduction 343 12.2 Key Distribution Protocols 344 12.2.1 Merkle s Puzzles 344 12.2.2 Shamir s Three-Pass Protocol 346 12.2.3 Asymmetric Encryption-Based Key Distribution Protocol 349 12.3 Key Agreement Protocols 350 12.4 Quantum Cryptography 352 12.4.1 Basic Principles 353 12.4.2 Quantum Key Exchange Protocol 355 12.4.3 Historicai and Recent Developments 358 12.5 Final Remarks 360 References 361 Chapter 13 Entity Authentication 363 13.1 Introduction 363 13.2 Authentication Technologies 364 13.2.1 Proof by Possession 365 13.2.2 Proof by Knowledge 366 13.2.3 Proof by Property 370 13.2.4 Proof by Location 371 13.3 Zero-Knowledge Authentication Protocols 372 13.3.1 Preliminary Remarks 373 Xli Contemporary Cryptography 13.3.2 Fiat-Shamir 374 13.3.3 Guillou-Quisquater 377 13.3.4 Schnorr 378 13.3.5 Turning Interactive Proofs of Knowledge into DSSs 379 13.4 Final Remarks 380 References 380 Chapter 14 Secure Multiparty Computation 383 14.1 Introduction 384 14.1.1 Communication Models 385 14.1.2 Adversary Models 386 14.1.3 Notions of Security 387 14.2 Major Results 387 14.3 Final Remarks 389 References 389 IV CONCLUSIONS 391 Chapter 15 Key Management 393 15.1 Introduction 393 15.2 Key Life Cycle 395 15.2.1 Key Generation 395 15.2.2 Key Distribution 395 15.2.3 Key Storage 396 15.2.4 Key Destruction 396 15.3 SecretSharing 397 15.3.1 Shamir s System 398 15.3.2 Blakley s System 399 15.3.3 Verifiable Secret Sharing 399 15.3.4 Visual Cryptography 400 15.4 Key Recovery 400 15.5 Public Key Infrastructure 402 15.5.1 PGP Certificates 406 15.5.2 X.509 Certificates 408 15.6 Final Remarks 411 References 412 Chapter 16 Summary 415 16.1 Unkeyed Cryptosystems 415 16.2 Secret Key Cryptosystems 417 Contenis xiii 16.3 Public Key Cryptosystems 418 16.4 Final Remarks 419 Chapter 17 Outlook 421 17.1 Theoretical Viewpoint 422 17.2 Practical Viewpoint 424 References 426 Appendix A Discrete Mathematics 427 A. 1 Algebraic Basics 427 A.I . 1 Preliminary Remarks 428 A. 1.2 Algebraic Sructures 431 A. 1.3 Homomorphisms and Isomorphisms 440 A. 1.4 Permutations 441 A.2 Integer Arithmetic 443 A.2.1 Integer Division 443 A.2.2 Common Divisors and Multiples 445 A.2.3 Euclidean Algorithms 446 A.2.4 Prime Numbers 451 A.2. 5 Factorization 459 A.2. 6 Euler s Totient Function 461 A.3 Modular Arithmetic 462 A.3.1 Modular Congruence 463 A.3.2 Modular Exponentiation 465 A.3 .3 Chinese Remainder Theorem 467 A.3.4 Fermaťs Little Theorem 469 A.3 .5 Euler s Theorem 470 A.3 .6 Finite Fields Modulo Irreducible Polynomials 470 A.3 .7 Quadratic Residuosity 472 A.3. 8 Blum Integers 479 References 480 Appendix В Probability Theory 481 B.I Basic Terms and Concepts 481 B.2 Random Variables 487 B.2. 1 Probability Distributions 488 B.2.2 Marginal Distributions 491 B.2.3 Conditional Probability Distributions 492 B.2.4 Expectation 492 B.2. 5 Independence of Random Variables 494 XIV Contemporary Cryptography В.2.6 Markov s Inequality 496 B.2.7 Variance and Standard Deviation 497 B.2.8 Chebyshev s Inequality 498 References 499 Appendix С Information Theory 501 C.I Introduction 501 C.2 Entropy 505 C.2.1 Joint Entropy 508 C2.2 Conditional Entropy 509 C.2.3 Mutual Information 511 C.3 Redundancy 512 СЛ Key Equivocation and Unicity Distance 513 References 514 Appendix D Complexity Theory 517 D.I Preliminary Remarks 517 D.2 Introduction 519 D.3 Asymptotic Order Notation 522 D.4 Efficient Computations 524 D.5 Computational Models 526 D.6 Complexity Classes 530 D.6.1 Complexity Class V 530 D.6.2 Complexity Classes MV and coMV 530 D.63 Complexity Class W and Its Subclasses 535 D.7 Shortcomings and Limitations 539 References 540 List of Symbols 543 Abbreviations and Acronyms 549 About the Author 557 Index 559
any_adam_object 1
author Oppliger, Rolf
author_GND (DE-588)1019191988
author_facet Oppliger, Rolf
author_role aut
author_sort Oppliger, Rolf
author_variant r o ro
building Verbundindex
bvnumber BV039161752
classification_rvk ST 276
classification_tum DAT 465f
ctrlnum (OCoLC)745529997
(DE-599)BSZ341272604
discipline Informatik
edition 2. ed.
format Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01567nam a22004212c 4500</leader><controlfield tag="001">BV039161752</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20120131 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">110727s2011 xx |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2005043576</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781608071456</subfield><subfield code="9">978-1-60807-145-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)745529997</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BSZ341272604</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-12</subfield><subfield code="a">DE-898</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Oppliger, Rolf</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1019191988</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Contemporary cryptography</subfield><subfield code="c">Rolf Oppliger</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2. ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston [u.a.]</subfield><subfield code="b">Artech House</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXV, 571 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">artech house information security and privacy series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4123623-3</subfield><subfield code="a">Lehrbuch</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung BSB Muenchen</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=024179230&amp;sequence=000002&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024179230</subfield></datafield></record></collection>
genre 1\p (DE-588)4123623-3 Lehrbuch gnd-content
genre_facet Lehrbuch
id DE-604.BV039161752
illustrated Not Illustrated
indexdate 2024-12-24T02:11:43Z
institution BVB
isbn 9781608071456
language English
lccn 2005043576
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-024179230
oclc_num 745529997
open_access_boolean
owner DE-91
DE-BY-TUM
DE-12
DE-898
DE-BY-UBR
owner_facet DE-91
DE-BY-TUM
DE-12
DE-898
DE-BY-UBR
physical XXV, 571 S.
publishDate 2011
publishDateSearch 2011
publishDateSort 2011
publisher Artech House
record_format marc
series2 artech house information security and privacy series
spellingShingle Oppliger, Rolf
Contemporary cryptography
Cryptography
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4033329-2
(DE-588)4123623-3
title Contemporary cryptography
title_auth Contemporary cryptography
title_exact_search Contemporary cryptography
title_full Contemporary cryptography Rolf Oppliger
title_fullStr Contemporary cryptography Rolf Oppliger
title_full_unstemmed Contemporary cryptography Rolf Oppliger
title_short Contemporary cryptography
title_sort contemporary cryptography
topic Cryptography
Kryptologie (DE-588)4033329-2 gnd
topic_facet Cryptography
Kryptologie
Lehrbuch
url http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024179230&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
work_keys_str_mv AT oppligerrolf contemporarycryptography