aller au contenu
Handbook of applied cryptography Aperçu de cet ouvrage
FermerAperçu de cet ouvrage

Handbook of applied cryptography

Auteur : Alfred J Menezes; Paul C VanOorschot; Scott A Vanstone
Éditeur: Boca Raton : CRC Press, 1997.
Collection: CRC press series on discrete mathematics and its applications.
Édition/format:   Livre imprimé : AnglaisVoir toutes les éditions et tous les formats
Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread  Lire la suite...

(pas encore évalué) 0 avec des critiques - Soyez le premier.

Plus comme ceci

Trouver un exemplaire en ligne

Trouver un exemplaire dans la bibliothèque

&AllPage.SpinnerRetrieving; Recherche de bibliothèques qui possèdent cet ouvrage...


Genre/forme: Handbooks and manuals
Handbooks, manuals, etc
0 Gesamtdarstellung
Type d’ouvrage: Ressource Internet
Type de document: Livre, Ressource Internet
Tous les auteurs / collaborateurs: Alfred J Menezes; Paul C VanOorschot; Scott A Vanstone
ISBN: 0849385237 9780849385230
Numéro OCLC: 247238920
Description: XXVIII, 780 Seiten : Diagramme.
Contenu: Foreword by Ronald L. RivestOverview of CryptographyIntroductionInformation security and cryptographyBackground on functions Functions(1-1, one-way, trapdoor one-way) Permutations InvolutionsBasic terminology and conceptsSymmetric-key encryption Overview of block ciphers and stream ciphers Substitution ciphers and transposition ciphers Composition of ciphers Stream ciphers The key spaceDigital signaturesAuthentication and identification Identification Data origin authenticationPublic-key cryptography Public-key encryption The necessity of authentication in public-key systems Digital signatures from reversible public-key encryption Symmetric-key versus public-key cryptographyHash functionsProtocols and mechanismsKey establishment, management, and certification Key management through symmetric-key techniques Key management through public-key techniques Trusted third parties and public-key certificatesPseudorandom numbers and sequencesClasses of attacks and security models Attacks on encryption schemes Attacks on protocols Models for evaluating security Perspective for computational securityNotes and further referencesMathematical BackgroundProbability theory Basic definitions Conditional probability Random variables Binomial distribution Birthday attacks Random mappingsInformation theory Entropy Mutual informationComplexity theory Basic definitions Asymptotic notation Complexity classes Randomized algorithmsNumber theory The integers Algorithms in Z The integers modulo n Algorithms in Zn The Legendre and Jacobi symbols Blum integersAbstract algebra Groups Rings Fields Polynomial rings Vector spacesFinite fields Basic properties The Euclidean algorithm for polynomials Arithmetic of polynomialsNotes and further referencesNumber-Theoretic Reference ProblemsIntroduction and overviewThe integer factorization problem Trial division Pollard's rho factoring algorithm Pollard's p - 1 factoring algorithm Elliptic curve factoring Random square factoring methods Quadratic sieve factoring Number field sieve factoringThe RSA problemThe quadratic residuosity problemComputing square roots in Zn Case (i): n prime Case (ii): n compositeThe discrete logarithm problem Exhaustive search Baby-step giant-step algorithm Pollard's rho algorithm for logarithms Pohlig-Hellman algorithm Index-calculus algorithm Discrete logarithm problem in subgroups of Z*pThe Diffie-Hellman problemComposite moduliComputing individual bits The discrete logarithm problem in Z*p - individual bits The RSA problem - individual bits The Rabin problem - individual bitsThe subset sum problem The L3-Iattice basis reduction algorithm Solving subset sum problems of low density Simultaneous diophantine approximationFactoring polynomials over finite fields Square-free factorization Beriekamp's Q-matrix algorithmNotes and further referencesPublic-Key Parameters Introduction Generating large prime numbers naively Distribution of prime numbersProbabilistic primality tests Fermat's test Solovay-Strassen test Miller-Rabin test Comparison: Fermat, Solovay-Strassen and Miller-Rabin(True) Primality tests Testing Mersenne numbers Primality testing using the factorization of n - 1 Jacobi sum test Tests using elliptic curvesPrime number generation Random search for probable primes Strong primes NIST method for generating DSA primes Constructive techniques for provable primesIrreducible polynomials over Zp Irreducible polynomials Irreducible trinomials Primitive polynomialsGenerators and elements of high order Selecting a prime p and generator of Z*pNotes and further referencesPseudorandom Bits and SequencesIntroduction Classification and frameworkRandom bit generationPseudorandom bit generation ANSI X9.17 FIPS 186Statistical tests The normal and chi-square distributions Hypothesis testing Golomb's randomness postulates Five basic tests Maurer's universal statistical testCryptographically secure pseudorandom bit generation RSA pseudorandom bit generator Blum-Blum-Shub pseudorandom bit generatorNotes and further referencesStream CiphersIntroduction ClassificationFeedback shift registers Linear feedback shift registers Linear complexity Berlekamp-Massey algorithm Nonlinear feedback shift registersStream ciphers based on LFSRs Nonlinear combination generators Nonlinear filter generators Clock-controlled generatorsOther stream ciphers SEALNotes and further referencesBlock CiphersIntroduction and overviewBackground and general concepts Introduction to block ciphers Modes of operation Exhaustive key search and multiple encryptionClassical ciphers and historical development Transposition ciphers Substitution ciphers Polyalphabetic substitutions and Vigenere ciphers Polyalphabetic cipher machines and rotors (historical) Cryptanalysis of classical ciphersDES Product ciphers and Feistel ciphers DES algorithm DES properties and strengthFEALIDEASAFER, RC5, and other block ciphers SAFER RC5 Other block ciphersNotes and further referencesPublic-Key EncryptionIntroduction Basic principlesRSA public-key encryption Description Security of RSA RSA encryption in practiceRabin public-key encryptionElGamal public-key encryption Basic ElGamal encryption Generalized ElGamal encryptionMcEliece public-key encryptionKnapsack public-key encryption Merkle-Hellman knapsack encryption Chor-Rivest knapsack encryptionProbabilistic public-key encryption Goldwasser-Micali probabilistic encryption Blum-Goldwasser probabilistic encryption Plaintext-aware encryptionNotes and further referencesHash Functions and Data IntegrityIntroductionClassification and framework General classification Basic properties and definitions Hash properties required for specific applications One-way functions and compression functions Relationships between properties Other hash function properties and applicationsBasic constructions and general results General model for iterated hash functions General constructions and extensions Formatting and initialization details Security objectives and basic attacks Bitsizes required for practical securityUnkeyed hash functions (MDCs) Hash functions based on block ciphers Customized hash functions based on MD4 Hash functions based on modular arithmeticKeyed hash functions (MACS) MACs based on block ciphers Constructing MACs from MDCs Customized MACs MACs for stream ciphersData integrity and message authentication Background and definitions Non-malicious vs. malicious threats to data integrity Data integrity using a MAC alone Data integrity using an MDC and an authentic channel Data integrity combined with encryptionAdvanced attacks on hash functions Birthday attacks Pseudo-collisions and compression function attacks Chaining attacks Attacks based on properties of underlying cipherNotes and further referencesIdentification and Entity AuthenticationIntroduction Identification objectives and applications Properties of identification protocolsPasswords (weak authentication) Fixed password schemes: techniques Fixed password schemes: attacks Case study - UNIX passwords PINs and passkeys One-time passwords (towards strong authentication)Challenge-response identification (strong authentication) Background on time-variant parameters Challenge-response by symmetric-key techniques Challenge-response by public-key techniquesCustomized and zero-knowledge identification protocols Overview of zero-knowledge concepts Feige-Fiat-Shamir identification protocol GQ identification protocol Schnorr identification protocol Comparison: Fiat-Shamir, GQ, and SchnorrAttacks on identification protocolsNotes and further referencesDigital SignaturesIntroductionA framework for digital signature mechanisms Basic definitions Digital signatures schemes with appendix Digital signature schemes with message recovery Types of attacks on signature schemesRSA and related signature schemes The RSA signature scheme Possible attacks on RSA signatures RSA signatures in practice The Rabin public-key signature scheme ISO/lEC 9796 formatting PKCS #1 formattingFiat-Shamir signature schemes Feige-Fiat-Shamir signature scheme GQ signature schemeThe DSA and related signature schemes The Digital Signature Algorithm (DSA) The ElGamal signature scheme The generalized ElGamal signature scheme The Schnorr signature scheme The ElGamal signature scheme with message recoveryOne-time digital signatures The Rabin one-time signature scheme The Merkle one-time signature scheme Authentication trees and one-time signatures The GMR one-time signature schemeOther signature schemes Arbitrated digital signatures ESIGNSignatures with additional functionality Blind signature schemes Undeniable signature schemes Fail-stop signature schemesNotes and further referencesKey Establishment ProtocolsIntroductionClassification and framework General classification and fundamental concepts Objectives and properties Assumptions and adversaries in key establishment protocolsKey transport based on symmetric encryption Symmetric key transport and derivation without a server Kerberos and related server-based protocolsKey agreement based on symmetric techniquesKey transport based on public-key encryption Key transport using PK encryption without signatures Protocols combining PK encryption and signatures Hybrid key transport protocols using PK encryptionKey agreement based on asymmetric techniques Diffie-Hellman and related key agreement protocols Implicitly-certified public keys Diffie-Hellman protocols using implicitly certified keysSecret sharing Simple shared control schemes Threshold schemes Generalized secret sharingConference keyingAnalysis of key establishment protocols Attack strategies and classic protocol flaws Analysis objectives and methodsNotes and further referencesKey Management TechniquesIntroductionBackground and basic concepts Classifying keys by algorithm type and intended use Key management objectives, threats, and policy Simple key establishment models Roles of third parties Tradeoffs among key establishment protocolsTechniques for distributing confidential keys Key layering and cryptoperiods Key translation centers and symmetric-key certificatesTechniques for distributing public keys Authentication trees Public-key certificates Identity-based systems Implicitly certified public keys Comparison of techniques for distributing public keysTechniques for controlling key usage Key separation and constraints on key usage Techniques for controlling use of symmetric keysKey management involving multiple domains Trust between two domains Trust models involving multiple certification authorities Certificate distribution and revocationKey life cycle issues Lifetime protection requirements Key management life cycleAdvanced trusted third party services Trusted timestamping service Non-repudiation and notarization of digital signatures Key escrowNotes and further referencesEfficient ImplementationIntroductionMultiple-precision integer arithmetic Radix representation Addition and subtraction Multiplication Squaring DivisionMultiple-precision modular arithmetic Classical modular multiplication Montgomery reduction Barrett reduction Reduction methods for moduli of special formGreatest common divisor algorithms Binary gcd algorithm Lehmer's gcd algorithm Binary extended gcd algorithmChinese remainder theorem for integers Residue number systems Garner's algorithmExponentiation Basic techniques for exponentiation Fixed-exponent exponentiation algorithms Fixed-base exponentiation algorithmsExponent recoding Signed-digit representation String-replacement representationNotes and further referencesPatents and StandardsIntroductionPatents on cryptographic techniques Five fundamental patents Ten prominent patents Ten selected patents Ordering and acquiring patentsCryptographic standards International standards - cryptographic techniques Banking security standards (ANSI, ISO) International security architectures and frameworks U.S. government standards (FIPS) Industry standards and RFCs De facto standards Ordering and acquiring standardsNotes and further referencesA. Bibliography of Papers from Selected Cryptographic ForumsAsiacrypt/Auscrypt ProceedingsCrypto ProceedingsEurocrypt ProceedingsFast Software Encryption ProceedingsJournal of Cryptology papersReferencesIndex
Titre de collection: CRC press series on discrete mathematics and its applications.
Responsabilité: Alfred J. Menezes ; Paul C. VanOorschot ; Scott A. Vanstone.
Plus d’informations:


Cryptography, in particular public-key cryptography, has emerged an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information  Lire la suite...


Critiques éditoriales

Synopsis de l’éditeur

"very well suited for the reader who wants an encyclopedic description of the state of the art of applied modern cryptography." -Mathematical Reviews, Issue 99g "[This book] is an incredible Lire la suite...

Critiques d’utilisateurs
Récupération des critiques de GoodReads...
Récuperation des critiques DOGObooks…


Soyez le premier.
Confirmez cette demande

Vous avez peut-être déjà demandé cet ouvrage. Veuillez sélectionner OK si vous voulez poursuivre avec cette demande quand même.

Données liées

Primary Entity

<> # Handbook of applied cryptography
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "247238920" ;
   library:placeOfPublication <> ; # Boca Raton
   schema:about <> ; # cryptographie
   schema:about <> ; # Cryptographie à clé publique
   schema:about <> ; # Computers--Access control
   schema:about <> ; # Computersicherheit
   schema:about <> ; # Cryptography
   schema:about <> ; # Cryptography
   schema:about <> ; # Ordinateurs--Accès--Contrôle
   schema:about <> ; # Kryptologie
   schema:about <> ; # authentification
   schema:about <> ; # Computers--Access control
   schema:about <> ; # RSA
   schema:about <> ; # identification
   schema:about <> ;
   schema:about <> ; # signature numérique
   schema:about <> ; # clé accès
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <> ; # Scott A. Vanstone
   schema:contributor <> ; # Paul C. VanOorschot
   schema:creator <> ; # Alfred J. Menezes
   schema:datePublished "1997" ;
   schema:description "Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography."The Handbook of Applied Cryptography" provides a treatment that is multifunctional. It serves as an introduction to the more practical aspects of both conventional and public-key cryptography. It is a valuable source of the latest techniques and algorithms for the serious practitioner. It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit. It provides a mathematical treatment to accompany practical discussions. It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed. Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use." ;
   schema:exampleOfWork <> ;
   schema:genre "Handbooks and manuals" ;
   schema:inLanguage "en" ;
   schema:isPartOf <> ; # CRC press series on discrete mathematics and its applications.
   schema:isPartOf <> ; # The CRC press series on discrete mathematics and its applications
   schema:name "Handbook of applied cryptography" ;
   schema:productID "247238920" ;
   schema:publication <> ;
   schema:publisher <> ; # CRC Press
   schema:url <> ;
   schema:url <> ;
   schema:url <> ;
   schema:workExample <> ;
   wdrs:describedby <> ;

Related Entities

<> # CRC press series on discrete mathematics and its applications.
    a bgn:PublicationSeries ;
   schema:hasPart <> ; # Handbook of applied cryptography
   schema:name "CRC press series on discrete mathematics and its applications." ;

<> # The CRC press series on discrete mathematics and its applications
    a bgn:PublicationSeries ;
   schema:hasPart <> ; # Handbook of applied cryptography
   schema:name "The CRC press series on discrete mathematics and its applications" ;

<> # authentification
    a schema:Intangible ;
   schema:name "authentification" ;
   schema:name "Authentification" ;

<> # Computersicherheit
    a schema:Intangible ;
   schema:name "Computersicherheit" ;

<> # cryptographie
    a schema:Intangible ;
   schema:name "cryptographie" ;
   schema:name "Cryptographie" ;

<> # Cryptographie à clé publique
    a schema:Intangible ;
   schema:name "Cryptographie à clé publique" ;

<> # Ordinateurs--Accès--Contrôle
    a schema:Intangible ;
   schema:name "Ordinateurs--Accès--Contrôle" ;

<> # signature numérique
    a schema:Intangible ;
   schema:name "signature numérique" ;

<> # Cryptography
    a schema:Intangible ;
   schema:name "Cryptography" ;

<> # Computers--Access control
    a schema:Intangible ;
   schema:name "Computers--Access control" ;

<> # Cryptography
    a schema:Intangible ;
   schema:name "Cryptography" ;

<> # Alfred J. Menezes
    a schema:Person ;
   schema:familyName "Menezes" ;
   schema:givenName "Alfred J." ;
   schema:name "Alfred J. Menezes" ;

<> # Scott A. Vanstone
    a schema:Person ;
   schema:familyName "Vanstone" ;
   schema:givenName "Scott A." ;
   schema:name "Scott A. Vanstone" ;

<> # Paul C. VanOorschot
    a schema:Person ;
   schema:familyName "VanOorschot" ;
   schema:givenName "Paul C." ;
   schema:name "Paul C. VanOorschot" ;

    a schema:ProductModel ;
   schema:isbn "0849385237" ;
   schema:isbn "9780849385230" ;

Content-negotiable representations

Fermer la fenêtre

Veuillez vous identifier dans WorldCat 

Vous n’avez pas de compte? Vous pouvez facilement créer un compte gratuit.