Handbook of Applied Cryptography (Hardcover)
暫譯: 應用密碼學手冊 (精裝版)

Alfred J. Menezes, Jonathan Katz, Paul C. van Oorschot, Scott A. Vanstone

  • 出版商: CRC
  • 出版日期: 1996-10-16
  • 售價: $6,870
  • 貴賓價: 9.5$6,527
  • 語言: 英文
  • 頁數: 780
  • 裝訂: Hardcover
  • ISBN: 0849385237
  • ISBN-13: 9780849385230
  • 相關分類: 資訊安全
  • 海外代購書籍(需單獨結帳)

買這商品的人也買了...

商品描述

Description  

  • Excellent organization of material and numbering of items provides easy and rapid access of information, and includes:
  • More than 200 algorithms and protocols
  • More than 200 tables and figures
  • More than 1,000 numbered definitions, facts, examples, notes, and remarks
  • Over 1,250 significant references, including brief comments on each paper
  • The expertise of more than 90 experts in cryptography who reviewed chapters in their specialties
  • Extensive notes at the end of each chapter survey the relevant literature
  • Five sample chapters available for download at www.dms.auburn.edu/hac

    Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography.

    The Handbook of Applied Cryptography provides a treatment that is multifunctional:

    ?It serves as an introduction to the more practical aspects of both conventional and public-key cryptography
    ?It is a valuable source of the latest techniques and algorithms for the serious practitioner
    ?It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit
    ?It provides a mathematical treatment to accompany practical discussions
    ?It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed
    Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.

 

Table of contents

Foreword by Ronald L. Rivest
Overview of Cryptography
Introduction
Information security and cryptography
Background on functions
Functions(1-1, one-way, trapdoor one-way)
Permutations
Involutions
Basic terminology and concepts
Symmetric-key encryption
Overview of block ciphers and stream ciphers
Substitution ciphers and transposition ciphers
Composition of ciphers
Stream ciphers
The key space
Digital signatures
Authentication and identification
Identification
Data origin authentication
Public-key cryptography
Public-key encryption
The necessity of authentication in public-key systems
Digital signatures from reversible public-key encryption
Symmetric-key versus public-key cryptography
Hash functions
Protocols and mechanisms
Key establishment, management, and certification
Key management through symmetric-key techniques
Key management through public-key techniques
Trusted third parties and public-key certificates
Pseudorandom numbers and sequences
Classes of attacks and security models
Attacks on encryption schemes
Attacks on protocols
Models for evaluating security
Perspective for computational security
Notes and further references
Mathematical Background
Probability theory
Basic definitions
Conditional probability
Random variables
Binomial distribution
Birthday attacks
Random mappings
Information theory
Entropy
Mutual information
Complexity theory
Basic definitions
Asymptotic notation
Complexity classes
Randomized algorithms
Number theory
The integers
Algorithms in Z
The integers modulo n
Algorithms in Zn
The Legendre and Jacobi symbols
Blum integers
Abstract algebra
Groups
Rings
Fields
Polynomial rings
Vector spaces
Finite fields
Basic properties
The Euclidean algorithm for polynomials
Arithmetic of polynomials
Notes and further references
Number-Theoretic Reference Problems
Introduction and overview
The integer factorization problem
Trial division
Pollard's rho factoring algorithm
Pollard's p - 1 factoring algorithm
Elliptic curve factoring
Random square factoring methods
Quadratic sieve factoring
Number field sieve factoring
The RSA problem
The quadratic residuosity problem
Computing square roots in Zn
Case (i): n prime
Case (ii): n composite
The discrete logarithm problem
Exhaustive search
Baby-step giant-step algorithm
Pollard's rho algorithm for logarithms
Pohlig-Hellman algorithm
Index-calculus algorithm
Discrete logarithm problem in subgroups of Z*p
The Diffie-Hellman problem
Composite moduli
Computing individual bits
The discrete logarithm problem in Z*p - individual bits
The RSA problem - individual bits
The Rabin problem - individual bits
The subset sum problem
The L3-Iattice basis reduction algorithm
Solving subset sum problems of low density
Simultaneous diophantine approximation
Factoring polynomials over finite fields
Square-free factorization
Beriekamp's Q-matrix algorithm
Notes and further references
Public-Key Parameters
Introduction
Generating large prime numbers naively
Distribution of prime numbers
Probabilistic primality tests
Fermat's test
Solovay-Strassen test
Miller-Rabin test
Comparison: Fermat, Solovay-Strassen and Miller-Rabin
(True) Primality tests
Testing Mersenne numbers
Primality testing using the factorization of n - 1
Jacobi sum test
Tests using elliptic curves
Prime number generation
Random search for probable primes
Strong primes
NIST method for generating DSA primes
Constructive techniques for provable primes
Irreducible polynomials over Zp
Irreducible polynomials
Irreducible trinomials
Primitive polynomials
Generators and elements of high order
Selecting a prime p and generator of Z*p
Notes and further references
Pseudorandom Bits and Sequences
Introduction
Classification and framework
Random bit generation
Pseudorandom bit generation
ANSI X9.17
FIPS 186
Statistical tests
The normal and chi-square distributions
Hypothesis testing
Golomb's randomness postulates
Five basic tests
Maurer's universal statistical test
Cryptographically secure pseudorandom bit generation
RSA pseudorandom bit generator
Blum-Blum-Shub pseudorandom bit generator
Notes and further references
Stream Ciphers
Introduction
Classification
Feedback shift registers
Linear feedback shift registers
Linear complexity
Berlekamp-Massey algorithm
Nonlinear feedback shift registers
Stream ciphers based on LFSRs
Nonlinear combination generators
Nonlinear filter generators
Clock-controlled generators
Other stream ciphers
SEAL
Notes and further references
Block Ciphers
Introduction and overview
Background and general concepts
Introduction to block ciphers
Modes of operation
Exhaustive key search and multiple encryption
Classical ciphers and historical development
Transposition ciphers
Substitution ciphers
Polyalphabetic substitutions and Vigen鋨e ciphers
Polyalphabetic cipher machines and rotors (historical)
Cryptanalysis of classical ciphers
DES
Product ciphers and Feistel ciphers
DES algorithm
DES properties and strength
FEAL
IDEA
SAFER, RC5, and other block ciphers
SAFER
RC5
Other block ciphers
Notes and further references
Public-Key Encryption
Introduction
Basic principles
RSA public-key encryption
Description
Security of RSA
RSA encryption in practice
Rabin public-key encryption
ElGamal public-key encryption
Basic ElGamal encryption
Generalized ElGamal encryption
McEliece public-key encryption
Knapsack public-key encryption
Merkle-Hellman knapsack encryption
Chor-Rivest knapsack encryption
Probabilistic public-key encryption
Goldwasser-Micali probabilistic encryption
Blum-Goldwasser probabilistic encryption
Plaintext-aware encryption
Notes and further references
Hash Functions and Data Integrity
Introduction
Classification and framework
General classification
Basic properties and definitions
Hash properties required for specific applications
One-way functions and compression functions
Relationships between properties
Other hash function properties and applications
Basic constructions and general results
General model for iterated hash functions
General constructions and extensions
Formatting and initialization details
Security objectives and basic attacks
Bitsizes required for practical security
Unkeyed hash functions (MDCs)
Hash functions based on block ciphers
Customized hash functions based on MD4
Hash functions based on modular arithmetic
Keyed hash functions (MACS)
MACs based on block ciphers
Constructing MACs from MDCs
Customized MACs
MACs for stream ciphers
Data integrity and message authentication
Background and definitions
Non-malicious vs. malicious threats to data integrity
Data integrity using a MAC alone
Data integrity using an MDC and an authentic channel
Data integrity combined with encryption
Advanced attacks on hash functions
Birthday attacks
Pseudo-collisions and compression function attacks
Chaining attacks
Attacks based on properties of underlying cipher
Notes and further references
Identification and Entity Authentication
Introduction
Identification objectives and applications
Properties of identification protocols
Passwords (weak authentication)
Fixed password schemes: techniques
Fixed password schemes: attacks
Case study - UNIX passwords
PINs and passkeys
One-time passwords (towards strong authentication)
Challenge-response identification (strong authentication)
Background on time-variant parameters
Challenge-response by symmetric-key techniques
Challenge-response by public-key techniques
Customized and zero-knowledge identification protocols
Overview of zero-knowledge concepts
Feige-Fiat-Shamir identification protocol
GQ identification protocol
Schnorr identification protocol
Comparison: Fiat-Shamir, GQ, and Schnorr
Attacks on identification protocols
Notes and further references
Digital Signatures
Introduction
A framework for digital signature mechanisms
Basic definitions
Digital signatures schemes with appendix
Digital signature schemes with message recovery
Types of attacks on signature schemes
RSA and related signature schemes
The RSA signature scheme
Possible attacks on RSA signatures
RSA signatures in practice
The Rabin public-key signature scheme
ISO/lEC 9796 formatting
PKCS #1 formatting
Fiat-Shamir signature schemes
Feige-Fiat-Shamir signature scheme
GQ signature scheme
The DSA and related signature schemes
The Digital Signature Algorithm (DSA)
The ElGamal signature scheme
The generalized ElGamal signature scheme
The Schnorr signature scheme
The ElGamal signature scheme with message recovery
One-time digital signatures
The Rabin one-time signature scheme
The Merkle one-time signature scheme
Authentication trees and one-time signatures
The GMR one-time signature scheme
Other signature schemes
Arbitrated digital signatures
ESIGN
Signatures with additional functionality
Blind signature schemes
Undeniable signature schemes
Fail-stop signature schemes
Notes and further references
Key Establishment Protocols
Introduction
Classification and framework
General classification and fundamental concepts
Objectives and properties
Assumptions and adversaries in key establishment protocols
Key transport based on symmetric encryption
Symmetric key transport and derivation without a server
Kerberos and related server-based protocols
Key agreement based on symmetric techniques
Key transport based on public-key encryption
Key transport using PK encryption without signatures
Protocols combining PK encryption and signatures
Hybrid key transport protocols using PK encryption
Key agreement based on asymmetric techniques
Diffie-Hellman and related key agreement protocols
Implicitly-certified public keys
Diffie-Hellman protocols using implicitly certified keys
Secret sharing
Simple shared control schemes
Threshold schemes
Generalized secret sharing
Conference keying
Analysis of key establishment protocols
Attack strategies and classic protocol flaws
Analysis objectives and methods
Notes and further references
Key Management Techniques
Introduction
Background and basic concepts
Classifying keys by algorithm type and intended use
Key management objectives, threats, and policy
Simple key establishment models
Roles of third parties
Tradeoffs among key establishment protocols
Techniques for distributing confidential keys
Key layering and cryptoperiods
Key translation centers and symmetric-key certificates
Techniques for distributing public keys
Authentication trees
Public-key certificates
Identity-based systems
Implicitly certified public keys
Comparison of techniques for distributing public keys
Techniques for controlling key usage
Key separation and constraints on key usage
Techniques for controlling use of symmetric keys
Key management involving multiple domains
Trust between two domains
Trust models involving multiple certification authorities
Certificate distribution and revocation
Key life cycle issues
Lifetime protection requirements
Key management life cycle
Advanced trusted third party services
Trusted timestamping service
Non-repudiation and notarization of digital signatures
Key escrow
Notes and further references
Efficient Implementation
Introduction
Multiple-precision integer arithmetic
Radix representation
Addition and subtraction
Multiplication
Squaring
Division
Multiple-precision modular arithmetic
Classical modular multiplication
Montgomery reduction
Barrett reduction
Reduction methods for moduli of special form
Greatest common divisor algorithms
Binary gcd algorithm
Lehmer's gcd algorithm
Binary extended gcd algorithm
Chinese remainder theorem for integers
Residue number systems
Garner's algorithm
Exponentiation
Basic techniques for exponentiation
Fixed-exponent exponentiation algorithms
Fixed-base exponentiation algorithms
Exponent recoding
Signed-digit representation
String-replacement representation
Notes and further references
Patents and Standards
Introduction
Patents on cryptographic techniques
Five fundamental patents
Ten prominent patents
Ten selected patents
Ordering and acquiring patents
Cryptographic standards
International standards - cryptographic techniques
Banking security standards (ANSI, ISO)
International security architectures and frameworks
U.S. government standards (FIPS)
Industry standards and RFCs
De facto standards
Ordering and acquiring standards
Notes and further references
A. Bibliography of Papers from Selected Cryptographic Forums
Asiacrypt/Auscrypt Proceedings
Crypto Proceedings
Eurocrypt Proceedings
Fast Software Encryption Proceedings
Journal of Cryptology papers
References
Index

商品描述(中文翻譯)

**描述**

優秀的資料組織和項目編號提供了資訊的快速存取,包括:
- 超過 200 種演算法和協議
- 超過 200 張表格和圖形
- 超過 1,000 條編號的定義、事實、範例、註解和備註
- 超過 1,250 條重要參考文獻,包括對每篇論文的簡要評論
- 超過 90 位密碼學專家的專業知識,他們審查了各自專業領域的章節
- 每章結尾的廣泛註解調查相關文獻
- 五個可從 www.dms.auburn.edu/hac 下載的範例章節

密碼學,特別是公鑰密碼學,在過去 20 年中已成為一個重要的學科,不僅是大量研究的主題,還為許多應用中的資訊安全提供了基礎。標準正在出現,以滿足大多數數據通信領域對密碼保護的需求。公鑰密碼技術現在被廣泛使用,特別是在金融服務行業、公共部門以及個人用於保護個人隱私的情況下,例如電子郵件。本手冊將作為新手和需要更廣泛覆蓋範圍的專家的寶貴參考。它是從事密碼學工作的專業人士所需的必要和及時的指南。

《應用密碼學手冊》提供了多功能的處理:
- 它作為傳統和公鑰密碼學更實用方面的介紹
- 它是認真從業者最新技術和演算法的寶貴來源
- 它提供了該領域的綜合處理,同時將每個主要主題呈現為自成一體的單元
- 它提供了數學處理以伴隨實際討論
- 它包含足夠的抽象性,成為理論家有價值的參考,同時包含足夠的細節以實際實現所討論的演算法

現在已進入第三版,這是新手以及經驗豐富的開發者、設計師、研究人員、工程師、計算機科學家和數學家都會使用的權威密碼學參考書。

**目錄**

Ronald L. Rivest 的前言
密碼學概述
介紹
資訊安全與密碼學
函數背景
函數(1-1,單向,陷門單向)
置換
自反
基本術語和概念
對稱密鑰加密
區塊密碼和串流密碼概述
替代密碼和置換密碼
密碼的組合
串流密碼
密鑰空間
數位簽章
身份驗證和識別
識別
數據來源身份驗證
公鑰密碼學
公鑰加密
公鑰系統中身份驗證的必要性
來自可逆公鑰加密的數位簽章
對稱密鑰與公鑰密碼學
雜湊函數
協議和機制
密鑰建立、管理和認證
通過對稱密鑰技術進行密鑰管理
通過公鑰技術進行密鑰管理
受信任的第三方和公鑰證書
偽隨機數和序列
攻擊類型和安全模型
對加密方案的攻擊
對協議的攻擊
評估安全性的模型
計算安全的視角
註解和進一步參考
數學背景
概率論
基本定義
條件概率
隨機變數
二項分佈
生日攻擊
隨機映射
資訊論

互信息
複雜性理論
基本定義
漸進符號
複雜性類別
隨機演算法
數論
整數
Z 中的演算法
模 n 的整數
Zn 中的演算法
Legendre 和 Jacobi 符號
Blum 整數
抽象代數



多項式環
向量空間
有限域
基本性質
多項式的歐幾里得算法
多項式的算術
註解和進一步參考
數論參考問題
介紹和概述
整數因式分解問題
試除法
Pollard 的 rho 因式分解算法
Pollard 的 p - 1 因式分解算法
橢圓曲線因式分解
隨機平方因式分解方法
二次篩選因式分解
數域篩選因式分解
RSA 問題
二次剩餘問題
在 Zn 中計算平方根
情況 (i):n 為質數
情況 (ii):n 為合數
離散對數問題
穷舉搜索
Baby-step giant-step 算法
Pollard 的 rho 算法用於對數
Pohlig-Hellman 算法
指數微積分算法
Z*p 的子群中的離散對數問題
Diffie-Hellman 問題
合成模數
計算單個位元
Z*p 中的離散對數問題 - 單個位元
RSA 問題 - 單個位元
Rabin 問題 - 單個位元
子集和問題
L3-格基底約簡算法
解決低密度的子集和問題
同時的丟番圖近似
在有限域上因式分解多項式
平方自由因式分解
Berlekamp 的 Q 矩陣算法
註解和進一步參考
公鑰參數
介紹
天真的生成大質數
質數的分佈
概率質數測試
Fermat 測試
Solovay-Strassen 測試
Miller-Rabin 測試
比較:Fermat、Solovay-Strassen 和 Miller-Rabin
(真)質數測試
測試梅森數
使用 n - 1 的因式分解進行質數測試
Jacobi 和測試
使用橢圓曲線的測試
質數生成
隨機搜索可能的質數
強質數
NIST 生成 DSA 質數的方法
可證明質數的建構技術
Zp 上的不可約多項式
不可約多項式
不可約三項式
原始多項式
高階生成元和元素
選擇質數 p 和 Z*p 的生成元
註解和進一步參考
偽隨機位元和序列
介紹
分類和框架
隨機位元生成
偽隨機位元生成
ANSI X9.17
FIPS 186
統計測試
正態分佈和卡方分佈
假設檢驗
Golomb 的隨機性公設
五個基本測試
Maurer 的通用統計測試
密碼學安全的偽隨機位元生成
RSA 偽隨機位元生成器
Blum-Blum-Shub 偽隨機位元生成器
註解和進一步參考
串流密碼
介紹
分類
反饋移位寄存器
線性反饋移位寄存器
線性複雜性
Berlekamp-Massey 算法
非線性反饋移位寄存器
基於 LFSR 的串流密碼
非線性組合生成器
非線性濾波器生成器
時鐘控制生成器
其他串流密碼
SEAL
註解和進一步參考
區塊密碼
介紹和概述
背景和一般概念
區塊密碼介紹
運作模式
穷舉密鑰搜索和多重加密
古典密碼和歷史發展
置換密碼
替代密碼
多字母替代和 Vigenère 密碼
多字母密碼機和轉子(歷史)
古典密碼的密碼分析
DES
產品密碼和 Feistel 密碼
DES 演算法
DES 性質和強度
FEAL
IDEA
SAFER、RC5 和其他區塊密碼
SAFER
RC5
其他區塊密碼
註解和進一步參考
公鑰加密
介紹
基本原則
RSA 公鑰加密
描述
RSA 的安全性
RSA 加密的實踐
Rabin 公鑰加密
ElGamal 公鑰加密
基本 ElGamal 加密
廣義 ElGamal 加密
McEliece 公鑰加密
背包公鑰加密
Merkle-Hellman 背包加密
Chor-Rivest 背包加密
概率公鑰加密
Goldwasser-Micali 概率加密
Blum-Goldwasser 概率加密
明文感知加密
註解和進一步參考
雜湊函數和數據完整性
介紹
分類和框架
一般分類
基本性質和定義
特定應用所需的雜湊性質
單向函數和壓縮函數
性質之間的關係
其他雜湊函數性質和應用
基本構造和一般結果
迭代雜湊函數的一般模型
一般構造和擴展
格式化和初始化細節
安全目標和基本攻擊
實用安全所需的位元大小
無密鑰雜湊函數(MDCs)
基於區塊密碼的雜湊函數
基於 MD4 的自定義雜湊函數
基於模運算的雜湊函數
有密鑰雜湊函數(MACS)
基於區塊密碼的 MAC
從 MDC 構造 MAC
自定義 MAC
串流密碼的 MAC
數據完整性和消息身份驗證
背景和定義
對數據完整性的非惡意與惡意威脅
僅使用 MAC 的數據完整性
使用 MDC 和真實通道的數據完整性
結合加密的數據完整性
進階攻擊