買這商品的人也買了...
-
$931Invitation to Cryptography
-
$1,274Fundamentals of Computer Security (Hardcover)
-
$931Security in Computing, 3/e (平裝)
-
$931Internet Security: Cryptographic Principles, Algorithms and Protocols (Hardcover)
-
$680$666 -
$880$695 -
$880$581 -
$1,650$1,568 -
$1,150$1,127 -
$1,400$1,372 -
$650$507 -
$550$468 -
$270$213 -
$450$383 -
$980$774 -
$420$399 -
$690$587 -
$880$616 -
$2,740$2,603 -
$780$702 -
$1,560$1,404 -
$620$527 -
$820$804 -
$600$480 -
$5,770$5,482
相關主題
商品描述
Description
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.
This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.
A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.
Table of contents
Preamble
1: Prehistory of Cryptography
1.1 Foundations of Conventional Cryptography
1.2 Roots of Modern Cryptography
1.3 The Shannon Theory of Secrecy
1.4 Exercises
2: Conventional Cryptography
2.1 The Data Encryption Standard (DES)
2.2 DES Modes of Operation
2.3 Multiple Encryption
2.4 An Application of DES: UNIX Passwords
2.5 Classical Cipher Skeletons
2.6 Other Block Cipher Examples
2.7 The Advanced Encryption Standard (AES)
2.8 Stream Ciphers
2.9 Brute Force Attacks
2.10 Exercises
3: Dedicated Conventional Cryptographic Primitives
3.1 Cryptographic Hashing
3.2 The Birthday Paradox
3.3 A Dedicated Attack on MD4
3.4 Message Authentication Codes
3.5 Cryptographic Pseudorandom Generators
3.6 Exercises4: Conventional Security Analysis
4.1 Differential Cryptanalysis
4.2 Linear Cryptanalysis
4.3 Classical Security Strengthening
4.4 Modern Security Analysis
4.5 Exercises
5: Security Protocols with Conventional Cryptography
5.1 Password Access Control
5.2 Challenge-Response Protocols
5.3 One-Time Password
5.4 Key Distribution
5.5 Authentication Chains
5.6 Wireless Communication: Two Case Studies
5.7 Exercises6: Algorithmic Algebra
6.1 Basic Group Theory
6.2 The Ring Zn
6.3 The Finite Field Zn
6.4 Finite Fields
6.5 Elliptic Curves over Finite Fields
6.6 Exercises7: Algorithmic Number Theory
7.1 Primality
7.2 Factorization
7.3 Computing Orders in Groups
7.4 Discrete Logarithm
7.5 Exercises8: Elements of Complexity Theory
8.1 Formal Computation
8.2 Ability Frontiers
8.3 Complexity Reduction
8.4 Exercises
9: Public-Key Cryptography
9.1 Diffie-Hellman
9.2 Experiment with NP-Completeness
9.3 Rivest-Shamir-Adleman (RSA)
9.4 ElGamal Encryption
9.5 Exercises
10: Digital Signature
10.1 Digital Signature Schemes
10.2 RSA Signature
10.3 ElGamal Signature Family
10.4 Toward Provable Security for Digital Signatures
10.5 Exercises
11: Cryptographic Protocols
11.1 Zero-Knowledge
11.2 Secret Sharing
11 3 Special Purpose Digital Signatures
11.4 Other Protocols
11.5 Exercises12: From Cryptography to Communication Security
12.1 Certificates
12.2 SSH: Secure Shell
12.3 SSL: Secure Socket Layer
12.4 PGP: Pretty Good Privacy
12.5 Exercises
Further Readings
Bibliography
Index
商品描述(中文翻譯)
描述
《古典密碼學導論:通訊安全應用》介紹了信息和通訊安全的基本原理,通過提供適當的數學概念來證明或破解密碼方案的安全性。這本高級教材涵蓋了傳統的密碼學基礎和對這些基礎的密碼分析;密碼學家的基礎代數和數論;公鑰密碼學和對這些方案的密碼分析;以及其他密碼協議,例如秘密共享、零知識證明和不可否認的簽名方案。《古典密碼學導論:通訊安全應用》適用於計算機科學本科和研究生水平的學生。這本書也適合業界的研究人員和從業人員。另外還有一本獨立的練習/解答手冊可供購買。
目錄
前言
1:密碼學的前史
1.1 傳統密碼學的基礎
1.2 現代密碼學的根源
1.3 香农的保密理論
1.4 練習
2:傳統密碼學
2.1 數據加密標準(DES)
2.2 DES的操作模式
2.3 多重加密
2.4 DES的應用:UNIX密碼
2.5 古典密碼的結構
2.6 其他分組密碼的例子
2.7 高級加密標準(AES)
2.8 流式密碼
2.9 暴力攻擊
2.10 練習
3:專用的傳統密碼學原理
3.1 密碼哈希
3.2 生日悖論
3.3 對MD4的專用攻擊
3.4 消息認證碼
3.5 密碼偽隨機生成器
3.6 練習
4:傳統安全分析
4.1 差分密碼分析
4.2 線性密碼分析
4.3 古典安全強化
4.4 現代安全分析
4.5 練習
5:使用傳統密碼學的安全協議
5.1 密碼訪問控制
5.2 挑戰-響應協議
5.3 一次性密碼
5.4 金鑰分發
5.5 認證鏈
5.6 無線通信:兩個案例研究
5.7 練習
6:算法代數
6.1 基本群論
6.2 環Zn
6.3 有限域Zn
6.4 有限域
6.5 有限域上的橢圓曲線
6.6 練習
7:算法數論
7.1 素性
7.2 因數分解
7.3 計算群中的次序
7.4 離散對數
7.5 練習
8:復雜性理論的要素
8.1 形式計算
8.2 能力邊界
8.3 復雜性降低
8.4 練習
9:公鑰密碼學
9.1 迪菲-赫爾曼
9.2 NP完全性實驗
9.3 RSA
9.4 ElGamal加密
9.5 練習
10:數字簽名
10.1 數字簽名方案
10.2 RSA簽名
10.3 ElGamal簽名系列
10.4 朝向可證明安全的數字簽名
10.5 練習
11:密碼學的未來