skip to content
Cryptography : Theory and Practice, Fourth Edition. Preview this item
ClosePreview this item
Checking...

Cryptography : Theory and Practice, Fourth Edition.

Author: Douglas Robert Stinson; Maura Paterson
Publisher: Boca Raton : Chapman and Hall/CRC, 2018.
Series: Textbooks in Mathematics Ser.
Edition/Format:   eBook : Document : English : 4th edView all editions and formats
Summary:
Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Stinson, Douglas Robert.
Cryptography : Theory and Practice, Fourth Edition.
Boca Raton : Chapman and Hall/CRC, ©2018
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Douglas Robert Stinson; Maura Paterson
ISBN: 9781315282480 1315282488 9781315282473 131528247X 9781315282466 1315282461 9781315282497 1315282496
OCLC Number: 1049912353
Notes: 6.4.3 The Miller-Rabin Algorithm
Description: 1 online resource (599 pages)
Contents: Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; 1: Introduction to Cryptography; 1.1 Cryptosystems and Basic Cryptographic Tools; 1.1.1 Secret-key Cryptosystems; 1.1.2 Public-key Cryptosystems; 1.1.3 Block and Stream Ciphers; 1.1.4 Hybrid Cryptography; 1.2 Message Integrity; 1.2.1 Message Authentication Codes; 1.2.2 Signature Schemes; 1.2.3 Nonrepudiation; 1.2.4 Certificates; 1.2.5 Hash Functions; 1.3 Cryptographic Protocols; 1.4 Security; 1.5 Notes and References; 2: Classical Cryptography; 2.1 Introduction: Some Simple Cryptosystems; 2.1.1 The Shift Cipher 2.1.2 The Substitution Cipher2.1.3 The Affine Cipher; 2.1.4 The Vigenère Cipher; 2.1.5 The Hill Cipher; 2.1.6 The Permutation Cipher; 2.1.7 Stream Ciphers; 2.2 Cryptanalysis; 2.2.1 Cryptanalysis of the Affine Cipher; 2.2.2 Cryptanalysis of the Substitution Cipher; 2.2.3 Cryptanalysis of the Vigenère Cipher; 2.2.4 Cryptanalysis of the Hill Cipher; 2.2.5 Cryptanalysis of the LFSR Stream Cipher; 2.3 Notes and References; Exercises; 3: Shannon's Theory, Perfect Secrecy, and the One-Time Pad; 3.1 Introduction; 3.2 Elementary Probability Theory; 3.3 Perfect Secrecy; 3.4 Entropy 3.4.1 Properties of Entropy3.5 Spurious Keys and Unicity Distance; 3.6 Notes and References; Exercises; 4: Block Ciphers and Stream Ciphers; 4.1 Introduction; 4.2 Substitution-Permutation Networks; 4.3 Linear Cryptanalysis; 4.3.1 The Piling-up Lemma; 4.3.2 Linear Approximations of S-boxes; 4.3.3 A Linear Attack on an SPN; 4.4 Differential Cryptanalysis; 4.5 The Data Encryption Standard; 4.5.1 Description of DES; 4.5.2 Analysis of DES; 4.6 The Advanced Encryption Standard; 4.6.1 Description of AES; 4.6.2 Analysis of AES; 4.7 Modes of Operation; 4.7.1 Padding Oracle Attack on CBC Mode 4.8 Stream Ciphers4.8.1 Correlation Attack on a Combination Generator; 4.8.2 Algebraic Attack on a Filter Generator; 4.8.3 Trivium; 4.9 Notes and References; Exercises; 5: Hash Functions and Message Authentication; 5.1 Hash Functions and Data Integrity; 5.2 Security of Hash Functions; 5.2.1 The Random Oracle Model; 5.2.2 Algorithms in the Random Oracle Model; 5.2.3 Comparison of Security Criteria; 5.3 Iterated Hash Functions; 5.3.1 The Merkle-Damgård Construction; 5.3.2 Some Examples of Iterated Hash Functions; 5.4 The Sponge Construction; 5.4.1 SHA-3; 5.5 Message Authentication Codes 5.5.1 Nested MACs and HMAC5.5.2 CBC-MAC; 5.5.3 Authenticated Encryption; 5.6 Unconditionally Secure MACs; 5.6.1 Strongly Universal Hash Families; 5.6.2 Optimality of Deception Probabilities; 5.7 Notes and References; Exercises; 6: The RSA Cryptosystem and Factoring Integers; 6.1 Introduction to Public-key Cryptography; 6.2 More Number Theory; 6.2.1 The Euclidean Algorithm; 6.2.2 The Chinese Remainder Theorem; 6.2.3 Other Useful Facts; 6.3 The RSA Cryptosystem; 6.3.1 Implementing RSA; 6.4 Primality Testing; 6.4.1 Legendre and Jacobi Symbols; 6.4.2 The Solovay-Strassen Algorithm
Series Title: Textbooks in Mathematics Ser.

Abstract:

Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world. Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9) New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1) New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A) An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1049912353> # Cryptography : Theory and Practice, Fourth Edition.
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "1049912353" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/35887189#Place/boca_raton> ; # Boca Raton
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/flu> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/data_encryption> ; # Data Encryption
    schema:about <http://dewey.info/class/005.824/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/cryptoanalysis> ; # Cryptoanalysis
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/identification_schemes> ; # Identification Schemes
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/ciphers_mathematics> ; # Ciphers--Mathematics
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/cryptosystems> ; # Cryptosystems
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/number_theory> ; # Number Theory
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/35887189#Topic/coding_theory> ; # Coding theory
    schema:bookEdition "4th ed." ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/35887189#Person/paterson_maura> ; # Maura Paterson
    schema:creator <http://experiment.worldcat.org/entity/work/data/35887189#Person/stinson_douglas_robert> ; # Douglas Robert Stinson
    schema:datePublished "2018" ;
    schema:description "Through three editions, Cryptography: Theory and Practice, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject's fundamentals while presenting the most current advances in cryptography. The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world. Key Features of the Fourth Edition: New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9) New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1) New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A) An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium. Interesting attacks on cryptosystems, including: padding oracle attack correlation attacks and algebraic attacks on stream ciphers attack on the DUAL-EC random bit generator that makes use of a trapdoor. A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard. Methods of key distribution in sensor networks. The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret. The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain. The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting."@en ;
    schema:description "Cover; Half Title; Title Page; Copyright Page; Dedication; Table of Contents; 1: Introduction to Cryptography; 1.1 Cryptosystems and Basic Cryptographic Tools; 1.1.1 Secret-key Cryptosystems; 1.1.2 Public-key Cryptosystems; 1.1.3 Block and Stream Ciphers; 1.1.4 Hybrid Cryptography; 1.2 Message Integrity; 1.2.1 Message Authentication Codes; 1.2.2 Signature Schemes; 1.2.3 Nonrepudiation; 1.2.4 Certificates; 1.2.5 Hash Functions; 1.3 Cryptographic Protocols; 1.4 Security; 1.5 Notes and References; 2: Classical Cryptography; 2.1 Introduction: Some Simple Cryptosystems; 2.1.1 The Shift Cipher"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/35887189> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/35887189#Series/textbooks_in_mathematics_ser> ; # Textbooks in Mathematics Ser.
    schema:isSimilarTo <http://worldcat.org/entity/work/data/35887189#CreativeWork/cryptography_theory_and_practice_fourth_edition> ;
    schema:name "Cryptography : Theory and Practice, Fourth Edition."@en ;
    schema:productID "1049912353" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1049912353#PublicationEvent/boca_raton_chapman_and_hall_crc_2018> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/35887189#Agent/chapman_and_hall_crc> ; # Chapman and Hall/CRC
    schema:url <https://www.taylorfrancis.com/books/e/9781315282480> ;
    schema:url <https://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=5493336> ;
    schema:url <https://nls.ldls.org.uk/welcome.html?ark:/81055/vdc_100066343746.0x000001> ;
    schema:workExample <http://worldcat.org/isbn/9781315282480> ;
    schema:workExample <http://worldcat.org/isbn/9781315282497> ;
    schema:workExample <http://dx.doi.org/10.1201/9781315282497> ;
    schema:workExample <http://worldcat.org/isbn/9781315282466> ;
    schema:workExample <http://worldcat.org/isbn/9781315282473> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB928321> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBB8E8920> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1049912353> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/35887189#Agent/chapman_and_hall_crc> # Chapman and Hall/CRC
    a bgn:Agent ;
    schema:name "Chapman and Hall/CRC" ;
    .

<http://experiment.worldcat.org/entity/work/data/35887189#Person/paterson_maura> # Maura Paterson
    a schema:Person ;
    schema:familyName "Paterson" ;
    schema:givenName "Maura" ;
    schema:name "Maura Paterson" ;
    .

<http://experiment.worldcat.org/entity/work/data/35887189#Person/stinson_douglas_robert> # Douglas Robert Stinson
    a schema:Person ;
    schema:familyName "Stinson" ;
    schema:givenName "Douglas Robert" ;
    schema:name "Douglas Robert Stinson" ;
    .

<http://experiment.worldcat.org/entity/work/data/35887189#Series/textbooks_in_mathematics_ser> # Textbooks in Mathematics Ser.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1049912353> ; # Cryptography : Theory and Practice, Fourth Edition.
    schema:name "Textbooks in Mathematics Ser." ;
    .

<http://experiment.worldcat.org/entity/work/data/35887189#Topic/ciphers_mathematics> # Ciphers--Mathematics
    a schema:Intangible ;
    schema:name "Ciphers--Mathematics"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/35887189#Topic/identification_schemes> # Identification Schemes
    a schema:Intangible ;
    schema:name "Identification Schemes"@en ;
    .

<http://worldcat.org/entity/work/data/35887189#CreativeWork/cryptography_theory_and_practice_fourth_edition>
    a schema:CreativeWork ;
    rdfs:label "Cryptography : Theory and Practice, Fourth Edition." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1049912353> ; # Cryptography : Theory and Practice, Fourth Edition.
    .

<http://worldcat.org/isbn/9781315282466>
    a schema:ProductModel ;
    schema:isbn "1315282461" ;
    schema:isbn "9781315282466" ;
    .

<http://worldcat.org/isbn/9781315282473>
    a schema:ProductModel ;
    schema:isbn "131528247X" ;
    schema:isbn "9781315282473" ;
    .

<http://worldcat.org/isbn/9781315282480>
    a schema:ProductModel ;
    schema:isbn "1315282488" ;
    schema:isbn "9781315282480" ;
    .

<http://worldcat.org/isbn/9781315282497>
    a schema:ProductModel ;
    schema:isbn "1315282496" ;
    schema:isbn "9781315282497" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.