Group Theoretic Cryptography

Group Theoretic Cryptography

5 (1 rating by Goodreads)
By (author)  , By (author)  , By (author)  , Series edited by 

Free delivery worldwide

Available. Dispatched from the UK in 2 business days
When will my order arrive?

Description

Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future. Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography. Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES. The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups. The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption-identification protocols, key establishment, and signature schemes are covered. The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.show more

Product details

  • Hardback | 244 pages
  • 154.94 x 236.22 x 17.78mm | 498.95g
  • Taylor & Francis Inc
  • Chapman & Hall/CRC
  • United States
  • English
  • 53 black & white illustrations
  • 1584888369
  • 9781584888369
  • 2,454,198

Review quote

"Group Theoretic Cryptography is highly welcome. It provides an excellent introduction in group-based cryptography where algebraic properties of the platform groups, mainly from combinatorial group theory, are used prominently in both devising cryptosystems and in cryptanalysis. In particular the difficulty, in a complexity sense, of certain algorithmic problems in finitely presented groups has been crucial in encryption and decryption. ... I highly recommend the book under review. It is of great value for researchers in the area as well as for advanced students which start to work in cryptology. The excellent figures and algorithmic descriptions are clear and good to understand. They help the readers to see the important points. -Gerhard Rosenberger (Hamburg), writing in Zentralblatt MATH 1321 - 1show more

About Maria Isabel Gonzalez Vasco

Universidad Rey Juan Carlos, Madrid, Spain Florida Atlantic University, Boca Raton, FL University of Waterloo, Ontario, Canadashow more

Table of contents

PRELIMINARIES Mathematical background Algebraic structures in a nutshell Finite groups Summary and further reading Exercises Basics on complexity Complexity classes Asymptotic notation and examples Summary and further reading Exercises Cryptology: An introduction A short historical overview Historical encryption schemes Public-key cryptography Modern cryptology Summary and further reading Exercises PUBLIC-KEY ENCRYPTION Provable security guarantees Public-key encryption revisited Characterizing secure public-key encryption One-way functions and random oracles The general Bellare-Rogaway construction IND-CCA security with an Abelian group: RSA-OAEP One-way functions from non-Abelian groups? Summary and further reading Exercises Public-key encryption in the standard model The Crame-Shoup encryption scheme from 1998 Going beyond: Tools Projective hash families Subset membership problems Hash proof systems General Cramer-Shoup encryption scheme A concrete instantiation Projective hash families from (non-Abelian) groups Group action systems Group action projective hash families Summary and further reading Exercises Public-key encryption using infinite groups The word problem in finitely presented groups The encryption scheme of Wagner and Magyarik Polly Cracker A successor of the Wagner-Magyarik scheme Using a group that is not finitely presentable? Braid groups in cryptography Basics on braid groups Some computational problems in the braid group Bn Summary and further reading Exercises III SECRET-KEY ENCRYPTION Block ciphers Advanced Encryption Standard Specifying the round function Key schedule Encryption and decryption with AES Data Encryption Standard General structure of DES: A Feistel cipher Round function of DES Key schedule Permutation Group Mappings Modes of operation Electronic codebook (ECB) mode Cipher block chaining (CBC) mode Cipher feedback (CFB) mode Output feedback (OFB) mode Counter (CTR) mode Summary and further reading Exercises Cryptographic hash functions and message authentication codes Cryptographic hash functions Deriving a hash function from a block cipher Cayley hash functions Message authentication codes Keyed-Hash Message Authentication Code Cipher-based Message Authentication Code Summary and further reading Exercises OTHER CRYPTOGRAPHIC CONSTRUCTIONS Key establishment protocols Setting the stage Provable security for key exchange protocols A secure construction Anshel-Anshel-Goldfeld key exchange Braid-based key exchange Constructions over matrix groups Summary and further reading Exercises Signature and identification schemes Definitions and terminology RSA signatures: FDH and PSS Identification schemes Summary and further reading Exercises APPENDIX Solutions to selected exercises Solutions to selected exercises of Part I Solutions to selected exercises of Part II Solutions to selected exercises of Part III Solutions to selected exercises of Part IV References Indexshow more

Rating details

1 ratings
5 out of 5 stars
5 100% (1)
4 0% (0)
3 0% (0)
2 0% (0)
1 0% (0)
Book ratings by Goodreads
Goodreads is the world's largest site for readers with over 50 million reviews. We're featuring millions of their reader ratings on our book pages to help you find your new favourite book. Close X