Cargando…

Introduction to cryptography /

"Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Padhye, Sahadeo (Autor), Sahu, Rajeev A. (Autor), Saraswat, Vishal (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, Taylor & Francis Group, [2018]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1053888392
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 180921s2018 flua ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d CRCPR  |d OCLCF  |d YDX  |d COO  |d EBLCP  |d CNCGM  |d NLE  |d MERER  |d OCLCQ  |d UKMGB  |d UWO  |d NRC  |d TYFRS  |d OCLCQ  |d UKAHL  |d OCLCQ  |d OTZ  |d OCLCQ  |d ZCU  |d OCLCQ  |d OCLCO  |d K6U  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBB8G6110  |2 bnb 
016 7 |a 019042990  |2 Uk 
019 |a 1033538088  |a 1202483818  |a 1300526335 
020 |a 9781315114590  |q (electronic bk.) 
020 |a 1315114593  |q (electronic bk.) 
020 |a 9781351628150 
020 |a 1351628151 
020 |a 9781351628136 
020 |a 1351628135 
020 |a 9781351628129 
020 |a 1351628127 
020 |z 9781138071537 
020 |z 1138071536 
024 7 |a 10.1201/9781315114590  |2 doi 
029 1 |a AU@  |b 000065167608 
029 1 |a CHBIS  |b 011432578 
029 1 |a CHVBK  |b 567541614 
029 1 |a UKMGB  |b 019042990 
035 |a (OCoLC)1053888392  |z (OCoLC)1033538088  |z (OCoLC)1202483818  |z (OCoLC)1300526335 
037 |a 9781351628136  |b Ingram Content Group 
050 4 |a QA268  |b .P33 2018eb 
072 7 |a SCI  |x 064000  |2 bisacsh 
072 7 |a TEC  |x 029000  |2 bisacsh 
072 7 |a COM  |x 083000  |2 bisacsh 
072 7 |a MAT  |x 036000  |2 bisacsh 
072 7 |a PBV  |2 bicssc 
082 0 4 |a 003/.54  |2 23 
049 |a UAMI 
100 1 |a Padhye, Sahadeo,  |e author. 
245 1 0 |a Introduction to cryptography /  |c Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat. 
264 1 |a Boca Raton, FL :  |b CRC Press, Taylor & Francis Group,  |c [2018] 
264 4 |c ©2018 
300 |a 1 online resource (xv, 251 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a "A science publishers book." 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a <P></P><P></P><B><P>Preface </P><P></P><P>Overview of Cryptography</P></B><P>Introduction </P><P>Goals of Cryptography<B> </P></B><P>Classification of Cryptosystem</P><P>Practically Useful Cryptosystem</P><P>Cryptanalysis</P><B><P></P><P>Basic Algebra</P></B><P>Group</P><P>Ring</P><P>Field</P><P>Exercise</P><P></P><B><P>Number Theory</P></B><P>Introduction</P><P>Prime Numbers</P><P>Cardinality of Primes</P><P>Extended Euclidean Algorithm</P><P>Primality Testing</P><P>Factorization and Algorithms for it</P><P>Congruences</P><P>Quadratic Congruence</P><P>Exponentiation and Logarithm</P><P>Discrete Logarithm Problem and Algorithms for it</P><P>Exercise</P><P></P><B><P>Probability and Perfect Secrecy</P></B><P>Basic Concept of Probability </P><P>Birthday Paradox</P><P>Perfect Secrecy</P><P>Vernam One Time Pad</P><P>Random Number Generation</P><P>Pseudo-random Number Generator</P><P>Exercise</P><P></P><B><P>Complexity Theory </P></B><P>Running Time and Size of Input </P><P>Big-O Notation </P><P>Types of algorithm</P><P>Complexity Classes</P><P>Exercise</P><P></P><B><P>Classical Cryptosystems</P></B><P>Classification of Classical Cryptosystem</P><P>Block Cipher</P><P>Stream Cipher</P><P>Cryptanalysis of Cryptosystems</P><P>Exercise</P><P></P><P> </P><B><P>Block Ciphers</P></B><P>Introduction</P><P>Modes of Operation</P><P>Padding</P><P>Design Considerations </P><P>Data Encryption Standard </P><P>Advanced Encryption Standard</P><P>Exercise </P><P></P><B><P>Hash Function </P></B><P>Compression and Hash Functions </P><P>Hash function for cryptography </P><P>Random Oracle Model </P><P>Cryptographic Hash Functions</P><P>Exercise</P><B><P>Public Key Cryptosystem</P></B><P>Introduction </P><P>Diffie-Hellman Key Exchange Protocol </P><P>RSA Cryptosystem</P><P>Rabin Cryptosystem</P><P>ElGamal Cryptosystem</P><P>Elliptic Curve Cryptosystem</P><P>Exercises </P><P></P><B><P>Digital Signature</P></B><P>Formal Definitions </P><P>Attack Goals for Digital Signature</P><P>Digital Signature in Practice</P><P>Some Popular Digital Signatures </P><P>Exercises</P><P></P><B><P>Research Directions in Cryptography </P></B><P>Pairing-Based Cryptography</P><P>Zero-knowledge Proof System</P><P>Authenticated Group Key Exchange</P><P>Attribute-Based Cryptography</P><P>Homomorphic Encryption </P><P>Secure Multi-party Computation</P><P>Secret Sharing</P><P>Post-Quantum Cryptography </P><P>Side-Channel Analysis</P><P>References</P><P>Index</P> 
505 0 |a Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital. 
505 0 |a Cover; Title Page; Copyright Page; Dedication; Foreword; Preface; Table of Contents; 1 Overview of Cryptography; 1.1 Introduction; 1.2 Goals of Cryptography; 1.3 Classification of Cryptosystem; 1.4 Practically Useful Cryptosystem; 1.4.1 Confusion and Diffusion; 1.5 Cryptanalysis; 1.5.1 Types of Attackers; 1.5.2 Types of Attacks; 1.5.3 Security Notions; 2 Basic Algebra; 2.1 Group; 2.2 Ring; 2.3 Field; 2.3.1 Finite Field; 2.3.2 Field Construction; 2.3.3 Field Construction using Irreducible Polynomial; 2.3.4 Galois Field GF(2n); 2.3.4.1 Integer Representation of Finite Field Elements. 
505 8 |a 2.3.5 Field Construction using Generator2.4 Exercises; 3 Number Theory; 3.1 Prime Numbers; 3.2 Cardinality of Primes; 3.3 Extended Euclidean Algorithm; 3.4 Congruences; 3.4.1 Solving Linear Congruence in Zn; 3.4.2 Chinese Remainder Theorem (CRT); 3.5 Integer Factorization Problem; 3.5.1 Trial Division Method; 3.5.2 Fermat's Method; 3.5.3 Pollard's p -- 1 Method; 3.5.4 Pollard's Rho Method; 3.5.5 Quadratic Sieve; 3.5.6 Number Field Sieve; 3.6 Primality Testing; 3.6.1 Sieve of Eratosthenes; 3.6.2 Divisibility Algorithm; 3.6.3 AKS Algorithm; 3.6.4 Fermat Test; 3.6.5 Miller-Rabin Algorithm. 
505 8 |a 3.7 Quadratic Congruence3.7.1 Quadratic Residue or Non-Residue; 3.7.2 Legendre Symbol and Jacobi Symbol; 3.8 Exponentiation and Logarithm; 3.8.1 Square and Multiply Method; 3.9 Discrete Logarithm Problem; 3.9.1 Shank's Baby-Step Giant-Step Algorithm; 3.9.2 Pollard's Rho Algorithm; 3.9.3 Pohlig-Hellman Algorithm; 3.9.4 Index Calculus Algorithm; 3.10 Exercises; 4 Probability and Perfect Secrecy; 4.1 Basic Concept of Probability; 4.2 Birthday Paradox; 4.3 Perfect Secrecy; 4.4 Vernam One-Time Pad; 4.5 Random Number Generation; 4.6 Pseudo-random Number Generator; 4.7 Exercises; 5 Complexity Theory. 
505 8 |a 5.1 Running Time and Size of Input5.2 Big-O Notation; 5.2.1 Big-O and Growth Rate; 5.2.2 Properties of Order Notation; 5.3 Types of Algorithm; 5.4 Complexity Classes; 5.5 Exercises; 6 Classical Cryptosystems; 6.1 Classification of Classical Cryptosystem; 6.2 Block Cipher; 6.2.1 Substitution Cipher; 6.2.1.1 Shift Cipher; 6.2.1.2 Affine Cipher; 6.2.1.3 Substitution Cipher; 6.2.1.4 Vigenere Cipher; 6.2.1.5 Hill Cipher; 6.2.2 Transposition Cipher; 6.2.2.1 Scytale; 6.2.2.2 The Rail Fence Cipher; 6.3 Stream Cipher; 6.3.1 Synchronous Stream Cipher. 
505 8 |a 6.3.1.1 Vigenere Cipher as Synchronous Stream Cipher6.3.2 Linear Feedback Shift Register (LFSR); 6.3.3 Non-Synchronous Stream Cipher; 6.3.3.1 Autokey Cipher; 6.4 Cryptanalysis of Cryptosystems; 6.4.1 Frequency Analysis; 6.4.2 Cryptanalysis of Affine Cipher; 6.4.3 Cryptanalysis of Substitution Cipher; 6.4.4 Cryptanalysis of Vigenere Cipher; 6.4.5 Cryptanalysis of Hill Cipher; 6.4.6 Cryptanalysis of LFSR Stream Cipher; 6.5 Exercises; 7 Block Ciphers; 7.1 Introduction; 7.1.1 Notations; 7.2 Modes of Operation; 7.2.1 Electronic Code Book (ECB); 7.2.1.1 ECB Properties. 
520 2 |a "Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. Students who have elementary knowledge of mathematics, will be introduced to mathematical notions relevant to cryptography, and the design and analysis of the cryptographic schemes. More advanced students who have already a background of algebra, number theory, probability and algorithms; will be able to review the applications of secure systems and will be introduced to cryptographic primitives and current research, besides being exposed to scope of future research addressing the open problems in related area. This book gives more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research."--Provided by publisher 
545 0 |a Sahadeo Padhye has a doctorate in Cryptography, and currently working as Associate Professor at Department of Mathematics, Motilal Nehru National Institute of Technology Allahabad, India. His research interests include Public key Cryptography, Elliptic Curve Cryptography, Digital Signatures, Lattice Based Cryptography. He has published many research papers in reputed international journals and conferences in Cryptography. Rajeev A Sahu has a doctorate in Cryptography and currently working as a Post-Doctoral Researcher at Universitâe Libre de Bruxelles, Belgium. He has also worked as an Assistant Professor at C.R. Rao Advanced Institute of Mathematics Statistics & Computer Science, Hyderabad, India. His research interests are Identity-Based Cryptography, Elliptic Curve Cryptography, Digital Signature, Searchable Encryption, Post-Quantum Cryptography on which he has published over two dozen research papers in reputed international journals and conferences in Computer Science and Cryptography. Vishal Saraswat received his Ph. D. in Cryptography from University of Minnesota, Minneapolis, USA and has held regular and visiting positions at a variety of institutions, including IIT Jammu, IIT Hyderabad, ISI Kolkata, Univ. of Hyderabad and AIMSCS, Hyderabad. His research interests include anonymity and privacy, searchable encryption, postquantum crypto, and active and passive cryptanalysis, topics on which he has published several papers in reputed international journals and conferences. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Cryptography  |x Mathematics. 
650 0 |a Number theory. 
650 0 |a Algorithms. 
650 2 |a Algorithms 
650 6 |a Cryptographie  |x Mathématiques. 
650 6 |a Théorie des nombres. 
650 6 |a Algorithmes. 
650 7 |a algorithms.  |2 aat 
650 7 |a SCIENCE  |x System Theory.  |2 bisacsh 
650 7 |a TECHNOLOGY & ENGINEERING  |x Operations Research.  |2 bisacsh 
650 7 |a COMPUTERS  |x Cryptography.  |2 bisacsh 
650 7 |a MATHEMATICS  |x Combinatorics.  |2 bisacsh 
650 7 |a Algorithms  |2 fast 
650 7 |a Cryptography  |x Mathematics  |2 fast 
650 7 |a Number theory  |2 fast 
700 1 |a Sahu, Rajeev A.,  |e author. 
700 1 |a Saraswat, Vishal,  |e author. 
758 |i has work:  |a Introduction to cryptography (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFM9KFkdvGMkC7y9Y6qFw3  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Padhye, Sahadeo.  |t Introduction to cryptography.  |d Boca Raton, FL : CRC Press, Taylor & Francis Group, [2018]  |z 9781138071537  |w (DLC) 2018002460  |w (OCoLC)1025358432 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5508462  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33784712 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33784713 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5508462 
938 |a EBSCOhost  |b EBSC  |n 1769573 
938 |a Taylor & Francis  |b TAFR  |n 9781315114590 
938 |a YBP Library Services  |b YANK  |n 15602746 
938 |a YBP Library Services  |b YANK  |n 15697059 
994 |a 92  |b IZTAP