Hilfe Warenkorb Konto Anmelden
 
 
   Schnellsuche   
     zur Expertensuche                      
Fundamentals of Cryptology
  Großes Bild
 
Fundamentals of Cryptology
von: Henk C.A. van Tilborg
Springer-Verlag, 2002
ISBN: 9780306470530
507 Seiten, Download: 72473 KB
 
Format:  PDF
geeignet für: Apple iPad, Android Tablet PC's Online-Lesen PC, MAC, Laptop

Typ: A (einfacher Zugriff)

 

 
eBook anfordern
Inhaltsverzeichnis

  Contents 6  
  Preface 14  
  1 Introduction 16  
     1.1 Introduction and Terminology 16  
     1.2 Shannon's Description of a Conventional Cryptosystem 17  
     1.3 Statistical Description of a Plaintext Source 19  
     1.4 Problems 22  
  2 Classical Cryptosystems 24  
     2.1 Caesar, Simple Substitution, Vigenère 24  
     2.2 The Incidence of Coincidences, Kasiski's Method 31  
     2.3 Vernam, Playfair, Transpositions, Hagelin, Enigma 35  
     2.4 Problems 40  
  3 Shift Register Sequences 42  
     3.1 Pseudo-Random Sequences 42  
     3.2 Linear Feedback Shift Registers 46  
     3.3 Non- Linear Algorithms 64  
     3.4 Problems 75  
  4 Block Ciphers 78  
     4.1 Some General Principles 78  
     4.2 DES 82  
     4.3 IDEA 85  
     4.4 Further Remarks 87  
     4.5 Problems 88  
  5 Shannon Theory 90  
     5.1 Entropy, Redundancy, and Unicity Distance 90  
     5.2 Mutual Information and Unconditionally Secure Systems 95  
     5.3 Problems 100  
  6 Data Compression Techniques 102  
     6.1 Basic Concepts of Source Coding for Stationary Sources 102  
     6.2 Huffman Codes 108  
     6.3 Universal Data Compression - The Lempel-Ziv Algorithms 112  
     6.4 Problems 118  
  7 Public-Key Cryptography 120  
     7.1 The Theoretical Model 120  
     7.2 Problems 124  
  8 Discrete Logarithm Based Systems 126  
     8.1 The Discrete Logarithm System 126  
     8.2 Other Discrete Logarithm Based Systems 131  
     8.3 How to Take Discrete Logarithms 136  
     8.4 Problems 160  
  9 RSA Based Systems 162  
     9.1 The RSA System 162  
     9.2 The Security of RSA: Some Factorization Algorithms 171  
     9.3 Some Unsafe Modes for RSA 184  
     9.4 How to Generate Large Prime Numbers 197  
     9.5 The Rabin Variant 212  
     9.6 Problems 224  
     9.5 The Rabin Variant 212  
  10 Elliptic Curves Based Systems 228  
     10.1 Some Basic Facts of Elliptic Curves 228  
     10.2 The Geometry of Elliptic Curves 231  
     10.3 Addition of Points on Elliptic Curves 239  
     10.4 Cryptosystems Defined over Elliptic Curves 245  
     10.5 Problems 251  
  11 Coding Theory Based Systems 252  
     11.1 Introduction to Goppa codes 252  
     11.2 The McEliece Cryptosystem 256  
     11.3 Another Technique to Decode Linear Codes 270  
     11.4 The Niederreiter Scheme 275  
     11.5 Problems 276  
  12 Knapsack Based Systems 278  
     12.1 The Knapsack System 278  
     12.2 The L3- Attack 285  
     12.3 The Chor-Rivest Variant 294  
     12.4 Problems 301  
  13 Hash Codes & Authentication Techniques 302  
     13.1 Introduction 302  
     13.2 Hash Functions and MAC's 303  
     13.3 Unconditionally Secure Authentication Codes 305  
     13.4 Problems 329  
  14 Zero Knowledge Protocols 330  
     14.1 The Fiat-Shamir Protocol 330  
     14.2 Schnorr's Identification Protocol 332  
     14.3 Problems 335  
  15 Secret Sharing Systems 336  
     15.1 Introduction 336  
     15.2 Threshold Schemes 338  
     15.3 Threshold Schemes with Liars 341  
     15.4 Secret Sharing Schemes 343  
     15.5 Visual Secret Sharing Schemes 348  
     15.6 Problems 356  
  Appendix A Elementary Number Theory 358  
     A.1 Introduction 358  
     A.2 Euclid's Algorithm 363  
     A.3 Congruences, Fermat, Euler, Chinese Remainder Theorem 367  
     A.4 Quadratic Residues 379  
     A.5 Continued Fractions 384  
     A.6 Möbius Inversion Formula, the Principle of Inclusion and Exclusion 393  
     A.7 Problems 397  
  Appendix B Finite Fields 398  
     B.1 Algebra 398  
     B.2 Constructions 410  
     B.3 The Number of Irreducible Polynomials over GF(q) 416  
     B.4 The Structure of Finite Fields 420  
     B.5 Problems 438  
  Appendix C Relevant Famous Mathematicians 440  
     Euclid of Alexandria 440  
     Leonhard Euler 441  
     Pierre de Fermat 443  
     Evariste Galois 449  
     Johann Carl Friedrich Gauss 454  
     Karl Gustav Jacob Jacobi 460  
     Adrien-Marie Legendre 461  
     August Ferdinand Möbius 462  
     Joseph Henry Maclagen Wedderburn 466  
  Appendix D New Functions 468  
  References 476  
  Symbols and Notations 484  
  Index 486  
  More eBook at www.ciando.com 0  


nach oben


  Mehr zum Inhalt
Kapitelübersicht
Kurzinformation
Inhaltsverzeichnis
Leseprobe
Blick ins Buch
Fragen zu eBooks?

  Medientyp
  eBooks
  eJournal
  alle

  Navigation
Belletristik / Romane
Computer
Geschichte
Kultur
Medizin / Gesundheit
Philosophie / Religion
Politik
Psychologie / Pädagogik
Ratgeber
Recht
Reise / Hobbys
Sexualität / Erotik
Technik / Wissen
Wirtschaft

  Info
Hier gelangen Sie wieder zum Online-Auftritt Ihrer Bibliothek
© 2008-2024 ciando GmbH | Impressum | Kontakt | F.A.Q. | Datenschutz