E-Book, Englisch, 268 Seiten
ISBN: 978-1-351-62813-6
Verlag: Taylor & Francis
Format: EPUB
Kopierschutz: Adobe DRM (»Systemvoraussetzungen)
Autoren/Hrsg.
Fachgebiete
Weitere Infos & Material
Introduction and mathematical foundation. Overview. Information security and cryptography. Why cryptography? Cryptography basics. Classical cryptography. Roadmap. Notes and further references. Mathematical foundation of cryptography. Abstract algebra. Number theory. Finite fields. Binary field arithmetic. Probability. Complexity theory. Notes and further references. Information theory. Shannon’s theory. Entropy. Perfect secrecy. Notes and further references. Security models and security proofs. Security goals. Attack models. Provable security. Proof techniques. Notes and further references. Zero-knowledge proofs. Perfect and computational zero-knowledge. Commitment schemes. Interaction and randomness. Proofs of knowledge. Notes and further references. Traditional cryptography. Stream ciphers. Feedback shift registers. Stream ciphers based on LFSRs. Other stream ciphers. Notes and further references. Block ciphers. Feistel network – DES etc. SP network – AES etc. Modes of transfer. Notes and further references. Hash functions. Data integrity and MDC. Message authentication and MAC. Basic constructions. Attacks on hash functions. Notes and further references. Public-key encryption. Diffie-Hellman key exchange. Knapsack Cryptosystem. ElGamal public-key encryption. RSA public-key encryption. Rabin public-key encryption. Notes and further references. Digital signatures. RSA and related signature schemes. ElGamal and related signature schemes. Schnorr signature scheme. Notes and further references. Modern cryptography. Elliptic curve cryptography. Introduction to elliptic curves. Algebra of elliptic curves. Public-key encryption. Signature schemes. Pairing-based cryptography. Notes and further references. Identity-based cryptography. Introduction -- advantages & disadvantages. Id-based encryption schemes. Id-based signature schemes. Cryptographic protocols based on IBE. Notes and further references. Applications. Identification. E-cash. E-voting. Notes and further references. Recent advances. Cloud. Internet of things (IoT). Big data. Notes and further references. Cryptanalysis. Classical cryptanalysis. Frequency analysis. Randomness testing. NIST suite. Notes and further references. Cryptanalysis of symmetric ciphers. Linear analysis. Differential analysis. Notes and further references. Attacks on factoring. Trial Division. Fermat’s Method. Pollard’s Rho Method. Pollard’s p-1 algorithm. Quadratic sieve method. Notes and further references. Attacks on discrete logarithm problem. Shank’s algorithm. Pollard’s rho Algorithm. Pohlig- Hellman Algorithm. Index-calculus Method. Notes and further references. Sidechannel attacks. Timing attacks. Power attacks. Fault attacks. EMR attacks. Notes and further references.