Cryptography : Theory and Practice

3.62 (83 ratings by Goodreads)
By (author) 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?


THE LEGACY...First introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography. WHY A THIRD EDITION? The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: * Pseudorandom bit generation in cryptography * Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes * Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs * Public key infrastructure, including identity-based cryptography * Secret sharing schemes * Multicast security, including broadcast encryption and copyright protection THE RESULT...Providing mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the more

Product details

  • Hardback | 616 pages
  • 162 x 236 x 38mm | 997.91g
  • Taylor & Francis Inc
  • Chapman & Hall/CRC
  • Boca Raton, FL, United States
  • English
  • Revised
  • 3rd Revised edition
  • 27 black & white illustrations, 18 black & white tables
  • 1584885084
  • 9781584885085
  • 495,841

Review quote

"It is by far the most suitable text for undergraduate and graduate courses on the subject in mathematics and computer science departments. Besides having breadth and scope in the choice of topics, many of them are dealt with in much more depth than what can be found elsewhere at this level ... If you really want to learn some cryptography this is probably the best available text." - Peter Shiu, Department of Mathematical Sciences, Loughborough University, in The Mathematical Gazette, March 2007 "... the book is very well suited for a course in crypotography." - Bran van Asch, in Mathematical Reviews, 2007fshow more

Table of contents

CLASSICAL CRYPTOGRAPHY Introduction: Some Simple Cryptosystems Cryptanalysis Notes Exercises SHANNON'S THEORY Introduction Elementary Probability Theory Perfect Secrecy Entropy Properties of Entropy Spurious Keys and Unicity Distance Product Cryptosystems Notes Exercises BLOCK CIPHERS AND THE ADVANCED ENCRYPTION STANDARD Introduction Substitution-Permutation Networks Linear Cryptanalysis Differential Cryptanalysis The Data Encryption Standard The Advanced Encryption Standard Modes of Operation Notes and References Exercises CRYPTOGRAPHIC HASH FUNCTIONS Hash Functions and Data Integrity Security of Hash Functions Iterated Hash Functions Message Authentication Codes Unconditionally Secure MACs Notes and References Exercises THE RSA CRYPTOSYSTEM AND FACTORING INTEGERS Introduction to Public-key Cryptography More Number Theory The RSA Cryptosystem Primality Testing Square Roots Modulo n Factoring Algorithms Other Attacks on RSA The Rabin Cryptosystem Semantic Security of RSA Notes and References Exercises PUBLIC-KEY CRYPTOGRAPHY AND DISCRETE LOGARITHMS The ElGamal Cryptosystem Algorithms for the Discrete Logarithm Problem Lower Bounds on the Complexity of Generic Algorithms Finite Fields Elliptic Curves Discrete Logarithm Algorithms in Practice Security of ElGamal Systems Notes and References Exercises SIGNATURE SCHEMES Introduction Security Requirements for Signature Schemes The ElGamal Signature Scheme Variants of the ElGamal Signature Scheme Provably Secure Signature Schemes Undeniable Signatures Fail-stop Signatures Notes and References Exercises PSEUDO-RANDOM NUMBER GENERATION Introduction and Examples Indistinguishability of Probability Distributions The Blum-Blum-Shub Generator Probabilistic Encryption Notes and References Exercises IDENTIFICATION SCHEMES AND ENTITY AUTHENTICATION Introduction Challenge-and-Response in the Secret-Key Setting Challenge-and-Response in the Public-Key Setting The Schnorr Identification Scheme The Okamoto Identification Scheme The Guillou-Quisquater Identification Scheme Notes and References Exercises KEY DISTRIBUTION Introduction Diffie-Hellman Key Predistribution Unconditionally Secure Key Predistribution Key Distribution Patterns Session Key Distribution Schemes Notes and References Exercises KEY AGREEMENT SCHEMES Introduction Diffie-Hellman Key Agreement MTI Key Agreement Schemes Key Agreement Using Self-Certifying Keys Encrypted Key Exchange Conference Key Agreement Schemes Notes and References Exercises PUBLIC-KEY INFRASTRUCTURE Introduction: What is a PKI? Certificates Trust Models The Future of PKI? Identity-Based Cryptography Notes and References Exercises SECRET SHARING SCHEMES Introduction: The Shamir Threshold Scheme Access Structures and General Secret Sharing Information Rate and Construction of Efficient Schemes Notes and References Exercises MULTICAST SECURITY AND COPYRIGHT PROTECTION Introduction to Multicast Security Broadcast Encryption Multicast Re-Keying Copyright Protection Tracing Illegally Redistributed Keys Notes and References Exercises FURTHER READING BIBLIOGRAPHY INDEXshow more

Rating details

83 ratings
3.62 out of 5 stars
5 20% (17)
4 41% (34)
3 25% (21)
2 7% (6)
1 6% (5)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X