skip to content
Public key cryptography : applications and attacks Preview this item
ClosePreview this item
Checking...

Public key cryptography : applications and attacks

Author: Lynn Margaret Batten
Publisher: Hoboken, N.J. : John Wiley & Sons, ©2013.
Series: IEEE Press series on information & communication networks security.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Batten, Lynn Margaret.
Public key cryptography.
Hoboken, N.J. : John Wiley & Sons, ©2013
(DLC) 2012025411
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Lynn Margaret Batten
ISBN: 9781118482315 111848231X 9781118482261 1118482263 9781283960526 1283960524
OCLC Number: 828735989
Language Note: English.
Description: 1 online resource (xvii, 201 pages) : illustrations.
Contents: PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic. 2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples. 4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem. 5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples. 6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test.
Series Title: IEEE Press series on information & communication networks security.
Responsibility: Lynn Margaret Batten.

Abstract:

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the  Read more...

Reviews

Editorial reviews

Publisher Synopsis

This is a book of great pedagogical value... The book is a bright exposition of the mathematical methods most used in public key cryptography, and it is very motivating due to its numerous Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/828735989> # Public key cryptography : applications and attacks
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "828735989" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/nju> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1170837873#Place/hoboken_n_j> ; # Hoboken, N.J.
    schema:about <http://id.worldcat.org/fast/1082562> ; # Public key cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/1170837873#Topic/cryptography_mathematics> ; # Cryptography--Mathematics
    schema:about <http://experiment.worldcat.org/entity/work/data/1170837873#Topic/computers_security_cryptography> ; # COMPUTERS--Security--Cryptography
    schema:about <http://id.worldcat.org/fast/884558> ; # Cryptography--Mathematics
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:bookFormat schema:EBook ;
    schema:copyrightYear "2013" ;
    schema:creator <http://viaf.org/viaf/76379005> ; # Lynn Margaret Batten
    schema:datePublished "2013" ;
    schema:description "This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur."@en ;
    schema:description "PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1170837873> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1170837873#Series/ieee_press_series_on_information_&_communication_networks_security> ; # IEEE Press series on information & communication networks security.
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1170837873#Series/ieee_press_series_on_information_and_communication_networks_security> ; # IEEE Press series on information and communication networks security
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1170837873#CreativeWork/public_key_cryptography> ;
    schema:name "Public key cryptography : applications and attacks"@en ;
    schema:productID "828735989" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/828735989#PublicationEvent/hoboken_n_j_john_wiley_&_sons_2013> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1170837873#Agent/john_wiley_&_sons> ; # John Wiley & Sons
    schema:url <http://proxy.library.carleton.ca/login?url=https://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474> ;
    schema:url <http://www.myilibrary.com?id=427302> ;
    schema:url <http://dx.doi.org/10.1002/9781118482261> ;
    schema:url <http://catalogimages.wiley.com/images/db/jimages/9781118317129.jpg> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=522952> ;
    schema:url <http://ieeexplore.ieee.org/xpl/bkabstractplus.jsp?bkn=6480474> ;
    schema:url <http://ieeexplore.ieee.org/servlet/opac?bknumber=6480474> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=1110556> ;
    schema:url <http://site.ebrary.com/id/10645213> ;
    schema:url <http://www.123library.org/book_details/?id=62940> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=1110556> ;
    schema:url <https://onlinelibrary.wiley.com/doi/book/10.1002/9781118482261> ;
    schema:workExample <http://worldcat.org/isbn/9781283960526> ;
    schema:workExample <http://worldcat.org/isbn/9781118482261> ;
    schema:workExample <http://worldcat.org/isbn/9781118482315> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/828735989> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1170837873#Agent/john_wiley_&_sons> # John Wiley & Sons
    a bgn:Agent ;
    schema:name "John Wiley & Sons" ;
    .

<http://experiment.worldcat.org/entity/work/data/1170837873#Place/hoboken_n_j> # Hoboken, N.J.
    a schema:Place ;
    schema:name "Hoboken, N.J." ;
    .

<http://experiment.worldcat.org/entity/work/data/1170837873#Series/ieee_press_series_on_information_&_communication_networks_security> # IEEE Press series on information & communication networks security.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/828735989> ; # Public key cryptography : applications and attacks
    schema:name "IEEE Press series on information & communication networks security." ;
    .

<http://experiment.worldcat.org/entity/work/data/1170837873#Series/ieee_press_series_on_information_and_communication_networks_security> # IEEE Press series on information and communication networks security
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/828735989> ; # Public key cryptography : applications and attacks
    schema:name "IEEE Press series on information and communication networks security" ;
    .

<http://experiment.worldcat.org/entity/work/data/1170837873#Topic/computers_security_cryptography> # COMPUTERS--Security--Cryptography
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Cryptography"@en ;
    .

<http://id.worldcat.org/fast/1082562> # Public key cryptography
    a schema:Intangible ;
    schema:name "Public key cryptography"@en ;
    .

<http://id.worldcat.org/fast/884558> # Cryptography--Mathematics
    a schema:Intangible ;
    schema:name "Cryptography--Mathematics"@en ;
    .

<http://viaf.org/viaf/76379005> # Lynn Margaret Batten
    a schema:Person ;
    schema:familyName "Batten" ;
    schema:givenName "Lynn Margaret" ;
    schema:name "Lynn Margaret Batten" ;
    .

<http://worldcat.org/entity/work/data/1170837873#CreativeWork/public_key_cryptography>
    a schema:CreativeWork ;
    rdfs:label "Public key cryptography." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/828735989> ; # Public key cryptography : applications and attacks
    .

<http://worldcat.org/isbn/9781118482261>
    a schema:ProductModel ;
    schema:isbn "1118482263" ;
    schema:isbn "9781118482261" ;
    .

<http://worldcat.org/isbn/9781118482315>
    a schema:ProductModel ;
    schema:isbn "111848231X" ;
    schema:isbn "9781118482315" ;
    .

<http://worldcat.org/isbn/9781283960526>
    a schema:ProductModel ;
    schema:isbn "1283960524" ;
    schema:isbn "9781283960526" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.