買這商品的人也買了...
-
$931Invitation to Cryptography
-
$1,274Fundamentals of Computer Security (Hardcover)
-
$931Security in Computing, 3/e (平裝)
-
$931Internet Security: Cryptographic Principles, Algorithms and Protocols (Hardcover)
-
$680$666 -
$880$695 -
$880$695 -
$1,650$1,568 -
$1,150$1,127 -
$1,400$1,372 -
$650$507 -
$550$468 -
$270$213 -
$450$383 -
$980$774 -
$420$399 -
$690$545 -
$880$695 -
$2,770$2,632 -
$780$663 -
$1,560$1,326 -
$620$409 -
$820$804 -
$600$480 -
$5,840$5,548
相關主題
商品描述
Description
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic schemes.
This advanced-level textbook covers conventional cryptographic primitives and cryptanalysis of these primitives; basic algebra and number theory for cryptologists; public key cryptography and cryptanalysis of these schemes; and other cryptographic protocols, e.g. secret sharing, zero-knowledge proofs and undeniable signature schemes.
A Classical Introduction to Cryptography: Applications for Communications Security is designed for upper-level undergraduate and graduate-level students in computer science. This book is also suitable for researchers and practitioners in industry. A separate exercise/solution booklet is available as well, please go to www.springeronline.com under author: Vaudenay for additional details on how to purchase this booklet.
Table of contents
Preamble
1: Prehistory of Cryptography
1.1 Foundations of Conventional Cryptography
1.2 Roots of Modern Cryptography
1.3 The Shannon Theory of Secrecy
1.4 Exercises
2: Conventional Cryptography
2.1 The Data Encryption Standard (DES)
2.2 DES Modes of Operation
2.3 Multiple Encryption
2.4 An Application of DES: UNIX Passwords
2.5 Classical Cipher Skeletons
2.6 Other Block Cipher Examples
2.7 The Advanced Encryption Standard (AES)
2.8 Stream Ciphers
2.9 Brute Force Attacks
2.10 Exercises
3: Dedicated Conventional Cryptographic Primitives
3.1 Cryptographic Hashing
3.2 The Birthday Paradox
3.3 A Dedicated Attack on MD4
3.4 Message Authentication Codes
3.5 Cryptographic Pseudorandom Generators
3.6 Exercises4: Conventional Security Analysis
4.1 Differential Cryptanalysis
4.2 Linear Cryptanalysis
4.3 Classical Security Strengthening
4.4 Modern Security Analysis
4.5 Exercises
5: Security Protocols with Conventional Cryptography
5.1 Password Access Control
5.2 Challenge-Response Protocols
5.3 One-Time Password
5.4 Key Distribution
5.5 Authentication Chains
5.6 Wireless Communication: Two Case Studies
5.7 Exercises6: Algorithmic Algebra
6.1 Basic Group Theory
6.2 The Ring Zn
6.3 The Finite Field Zn
6.4 Finite Fields
6.5 Elliptic Curves over Finite Fields
6.6 Exercises7: Algorithmic Number Theory
7.1 Primality
7.2 Factorization
7.3 Computing Orders in Groups
7.4 Discrete Logarithm
7.5 Exercises8: Elements of Complexity Theory
8.1 Formal Computation
8.2 Ability Frontiers
8.3 Complexity Reduction
8.4 Exercises
9: Public-Key Cryptography
9.1 Diffie-Hellman
9.2 Experiment with NP-Completeness
9.3 Rivest-Shamir-Adleman (RSA)
9.4 ElGamal Encryption
9.5 Exercises
10: Digital Signature
10.1 Digital Signature Schemes
10.2 RSA Signature
10.3 ElGamal Signature Family
10.4 Toward Provable Security for Digital Signatures
10.5 Exercises
11: Cryptographic Protocols
11.1 Zero-Knowledge
11.2 Secret Sharing
11 3 Special Purpose Digital Signatures
11.4 Other Protocols
11.5 Exercises12: From Cryptography to Communication Security
12.1 Certificates
12.2 SSH: Secure Shell
12.3 SSL: Secure Socket Layer
12.4 PGP: Pretty Good Privacy
12.5 Exercises
Further Readings
Bibliography
Index
商品描述(中文翻譯)
**描述**
《古典密碼學導論:通訊安全的應用》介紹了信息和通訊安全的基本原理,提供適當的數學概念來證明或破解密碼方案的安全性。
這本進階教材涵蓋了傳統密碼學原語及其密碼分析;密碼學家的基本代數和數論;公鑰密碼學及其方案的密碼分析;以及其他密碼協議,例如秘密分享、零知識證明和不可否認簽名方案。
《古典密碼學導論:通訊安全的應用》旨在為計算機科學的高年級本科生和研究生設計。本書也適合業界的研究人員和從業者。另有單獨的練習/解答手冊可供購買,詳情請訪問 www.springeronline.com,作者為 Vaudenay。
**目錄**
前言
1:密碼學的前史
1.1 傳統密碼學的基礎
1.2 現代密碼學的根源
1.3 香農的保密理論
1.4 練習
2:傳統密碼學
2.1 數據加密標準 (DES)
2.2 DES 的運作模式
2.3 多重加密
2.4 DES 的應用:UNIX 密碼
2.5 古典密碼骨架
2.6 其他區塊密碼示例
2.7 高級加密標準 (AES)
2.8 流密碼
2.9 暴力破解攻擊
2.10 練習
3:專用的傳統密碼學原語
3.1 密碼雜湊
3.2 生日悖論
3.3 對 MD4 的專用攻擊
3.4 消息認證碼
3.5 密碼學偽隨機生成器
3.6 練習
4:傳統安全分析
4.1 差分密碼分析
4.2 線性密碼分析
4.3 古典安全強化
4.4 現代安全分析
4.5 練習
5:使用傳統密碼學的安全協議
5.1 密碼訪問控制
5.2 挑戰-回應協議
5.3 一次性密碼
5.4 密鑰分發
5.5 認證鏈
5.6 無線通信:兩個案例研究
5.7 練習
6:算法代數
6.1 基本群論
6.2 環 Zn
6.3 有限域 Zn
6.4 有限域
6.5 有限域上的橢圓曲線
6.6 練習
7:算法數論
7.1 質數性
7.2 因式分解
7.3 計算群中的階
7.4 離散對數
7.5 練習
8:複雜性理論的元素
8.1 正式計算
8.2 能力邊界
8.3 複雜性減少
8.4 練習
9:公鑰密碼學
9.1 Diffie-Hellman
9.2 NP 完全性實驗
9.3 Rivest-Shamir-Adleman (RSA)
9.4 ElGamal 加密
9.5 練習
10:數位簽名
10.1 數位簽名方案
10.2 RSA 簽名
10.3 ElGamal 簽名家族
10.4 朝向可證明的數位簽名安全性
10.5 練習
11:密碼協議
11.1 零知識
11.2 秘密分享
11.3 特殊用途數位簽名
11.4 其他協議
11.5 練習
12:從密碼學到通訊安全
12.1 證書
12.2 SSH:安全外殼
12.3 SSL:安全套接層
12.4 PGP:相當好的隱私
12.5 練習
進一步閱讀
參考文獻
索引