skip to content
Introduction to modern cryptography Preview this item
ClosePreview this item
Checking...

Introduction to modern cryptography

Author: Jonathan Katz; Yehuda Lindell
Publisher: Boca Raton, FL : Chapman & Hall/CRC, 2008
Series: Chapman and Hall/CRC cryptography and network security
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
With an emphasis on precise definitions of cryptography as well as provable security, "Introduction to Modern Cryptography: Principles and Protocols" presents many definitions, formal and precise assumptions, and rigorous proofs along with the appropriate motivation and intuition. This book provides coverage of such topics as pseudorandom number generators/functions and the random oracle model. The authors discuss  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Jonathan Katz; Yehuda Lindell
ISBN: 1584885513 9781584885511
OCLC Number: 474193364
Description: xviii, 534 s
Contents: PREFACEINTRODUCTION AND CLASSICAL CRYPTOGRAPHY INTRODUCTION Cryptography and Modern Cryptography The Setting of Private-Key Encryption Historical Ciphers and Their Cryptanalysis The Basic Principles of Modern Cryptography PERFECTLY SECRET ENCRYPTION Definitions and Basic Properties The One-Time Pad (Vernam's Cipher) Limitations of Perfect Secrecy Shannon's Theorem Summary PRIVATE-KEY (SYMMETRIC) CRYPTOGRAPHY PRIVATE-KEY ENCRYPTION AND PSEUDORANDOMNESSA Computational Approach to CryptographyA Definition of Computationally Secure EncryptionPseudorandomnessConstructing Secure Encryption SchemesSecurity against Chosen-Plaintext Attacks (CPA) Constructing CPA-Secure Encryption SchemesSecurity against Chosen-Ciphertext Attacks (CCA)MESSAGE AUTHENTICATION CODES AND COLLISION-RESISTANT HASH FUNCTIONSSecure Communication and Message Integrity Encryption vs. Message Authentication Message Authentication Codes-DefinitionsConstructing Secure Message Authentication CodesCBC-MACCollision-Resistant Hash FunctionsNMAC and HMACConstructing CCA-Secure Encryption Schemes Obtaining Privacy and Message AuthenticationPRACTICAL CONSTRUCTIONS OF PSEUDORANDOM PERMUTATIONS (BLOCK CIPHERS)Substitution-Permutation Networks Feistel NetworksThe Data Encryption Standard (DES)Increasing the Key Size of a Block Cipher The Advanced Encryption Standard (AES)Differential and Linear Cryptanalysis-A Brief LookTHEORETICAL CONSTRUCTIONS OF PSEUDORANDOM OBJECTS One-Way Functions Overview: From One-Way Functions to PseudorandomnessA Hard-Core Predicate for Any One-Way FunctionConstructing Pseudorandom Generators Constructing Pseudorandom Functions Constructing (Strong) Pseudorandom Permutations Necessary Assumptions for Private-Key CryptographyA Digression-Computational IndistinguishabilityPUBLIC-KEY (ASYMMETRIC) CRYPTOGRAPHY NUMBER THEORY AND CRYPTOGRAPHIC HARDNESS ASSUMPTIONS Preliminaries and Basic Group TheoryPrimes, Factoring, and RSAAssumptions in Cyclic GroupsCryptographic Applications of Number-Theoretic AssumptionsFACTORING AND COMPUTING DISCRETE LOGARITHMS Algorithms for FactoringAlgorithms for Computing Discrete LogarithmsPRIVATE-KEY MANAGEMENT AND THE PUBLIC-KEY REVOLUTION Limitations of Private-Key CryptographyA Partial Solution-Key Distribution CentersThe Public-Key RevolutionDiffie-Hellman Key ExchangePUBLIC-KEY ENCRYPTION Public-Key Encryption-An OverviewDefinitionsHybrid Encryption RSA EncryptionThe El Gamal Encryption Scheme Security against CCATrapdoor PermutationsADDITIONAL PUBLIC-KEY ENCRYPTION SCHEMESThe Goldwasser-Micali Encryption SchemeThe Rabin Encryption SchemeThe Paillier Encryption SchemeDIGITAL SIGNATURE SCHEMESDigital Signatures-An OverviewDefinitionsRSA SignaturesThe Hash-and-Sign Paradigm Lamport's One-Time Signature Scheme Signatures from Collision-Resistant HashingThe Digital Signature Standard Certificates and Public-Key InfrastructuresPUBLIC-KEY CRYPTOSYSTEMS IN THE RANDOM ORACLE MODEL The Random Oracle Methodology Public-Key Encryption in the Random Oracle Model Signatures in the Random Oracle ModelAPPENDIX A: MATHEMATICAL BACKGROUND Identities and InequalitiesAsymptotic NotationBasic Probability The Birthday Problem APPENDIX B: SUPPLEMENTARY ALGORITHMIC NUMBER THEORY Integer ArithmeticModular Arithmetic Finding a Generator of a Cyclic GroupINDEXEach chapter contains References, Additional Reading, and Exercises.
Series Title: Chapman and Hall/CRC cryptography and network security
Responsibility: Jonathan Katz, Yehuda Lindell

Abstract:

Offers an accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs. This work introduces the core principles of modern cryptography,  Read more...

Reviews

Editorial reviews

Publisher Synopsis

This book is a comprehensive, rigorous introduction to what the authors name `modern' cryptography ... a novel approach to how cryptography is taught, replacing the older, construction-based Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/474193364<\/a>> # Introduction to modern cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"474193364<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Place\/boca_raton_fl<\/a>> ; # Boca Raton, FL<\/span>\n\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/872484<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.82\/e22\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/887935<\/a>> ; # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/id.worldcat.org\/fast\/884552<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/elektroniske_underskrifter<\/a>> ; # Elektroniske underskrifter<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/edb_sikkerhed<\/a>> ; # Edb-sikkerhed<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/kryptering<\/a>> ; # Kryptering<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/viaf.org\/viaf\/8361041<\/a>> ; # Yehuda Lindell<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/viaf.org\/viaf\/85207069<\/a>> ; # Jonathan Katz<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2008<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"With an emphasis on precise definitions of cryptography as well as provable security, \"Introduction to Modern Cryptography: Principles and Protocols\" presents many definitions, formal and precise assumptions, and rigorous proofs along with the appropriate motivation and intuition. This book provides coverage of such topics as pseudorandom number generators\/functions and the random oracle model. The authors discuss classical encryption schemes like Vigenere and substitution, explaining why they are insecure. Including cryptographic algorithms, this text offers a systematic presentation of the symmetric-key setting, the public-key setting, cryptography in practice, and advanced topics<\/span>\" ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/114189432<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Series\/chapman_and_hall_crc_cryptography_and_network_security<\/a>> ; # Chapman and Hall\/CRC cryptography and network security<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Introduction to modern cryptography<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"474193364<\/span>\" ;\u00A0\u00A0\u00A0\nschema:publication<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/474193364#PublicationEvent\/boca_raton_fl_chapman_&_hall_crc_2008<\/a>> ;\u00A0\u00A0\u00A0\nschema:publisher<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Agent\/chapman_&_hall_crc<\/a>> ; # Chapman & Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781584885511<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/474193364<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.82\/e22\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Agent\/chapman_&_hall_crc<\/a>> # Chapman & Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:Agent<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chapman & Hall\/CRC<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Place\/boca_raton_fl<\/a>> # Boca Raton, FL<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Boca Raton, FL<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Series\/chapman_and_hall_crc_cryptography_and_network_security<\/a>> # Chapman and Hall\/CRC cryptography and network security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/474193364<\/a>> ; # Introduction to modern cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chapman and Hall\/CRC cryptography and network security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/edb_sikkerhed<\/a>> # Edb-sikkerhed<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Edb-sikkerhed<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/elektroniske_underskrifter<\/a>> # Elektroniske underskrifter<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Elektroniske underskrifter<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/kryptering<\/a>> # Kryptering<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Kryptering<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"flu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/872484<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/884552<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.worldcat.org\/fast\/887935<\/a>> # Data encryption (Computer science)<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Data encryption (Computer science)<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/8361041<\/a>> # Yehuda Lindell<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Lindell<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Yehuda<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Yehuda Lindell<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/viaf.org\/viaf\/85207069<\/a>> # Jonathan Katz<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Katz<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jonathan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jonathan Katz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781584885511<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1584885513<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781584885511<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/474193364<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/474193364<\/a>> ; # Introduction to modern cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2021-01-24<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/474193364#PublicationEvent\/boca_raton_fl_chapman_&_hall_crc_2008<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:PublicationEvent<\/a> ;\u00A0\u00A0\u00A0\nschema:location<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Place\/boca_raton_fl<\/a>> ; # Boca Raton, FL<\/span>\n\u00A0\u00A0\u00A0\nschema:organizer<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Agent\/chapman_&_hall_crc<\/a>> ; # Chapman & Hall\/CRC<\/span>\n\u00A0\u00A0\u00A0\nschema:startDate<\/a> \"2008<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Content-negotiable representations<\/p>\n