skip to content
Introduction to modern cryptography Preview this item
ClosePreview this item
Checking...

Introduction to modern cryptography

Author: Jonathan Katz; Yehuda Lindell
Publisher: Boca Raton : CRC Press/Taylor & Francis, [2015] ©2015
Series: Chapman & Hall/CRC cryptography and network security.
Edition/Format:   Print book : English : Second editionView all editions and formats
Summary:
"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Jonathan Katz; Yehuda Lindell
ISBN: 9781466570269 1466570261 146657027X 9781466570276 1466570288 9781466570283
OCLC Number: 893721520
Description: xx, 583 pages : illustrations ; 25 cm.
Contents: Preface --
I. Introduction and Classical Cryptography --
Introduction --
Perfectly Secret Encryption --
II. Private-Key (Symmetric) Cryptography --
Private-Key Encryption --Message Authentication Codes --
Hash Functions and Applications --
Practical Constructions of Symmetric-Key Primitives --
Theoretical Constructions of Symmetric-Key Primitives --
III. Public-Key (Asymmetric) Cryptography --
Number Theory and Cryptographic Hardness Assumptions --
Algorithms for Factoring and Computing Discrete Logarithms --
Key Management and the Public-Key Revolution --
Public-Key Encryption --
Digital Signature Schemes --
Advanced Topics in Public-Key Encryption --
Index of Common Notation --
Appendix A: Mathematical Background --
Appendix B: Basic Algorithmic Number Theory.
Series Title: Chapman & Hall/CRC cryptography and network security.
Responsibility: Jonathan Katz, University of Maryland, College Park, MD, USA, Yehuda Lindell, Bar-llan University, Ramat Gan, Israel.
More information:

Abstract:

"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study."--

Reviews

Editorial reviews

Publisher Synopsis

"The work is comprehensive, rigorous, and yet accessible for dedicated students."-Computing Reviews, October 2015"... this book fills a significant gap among previous cryptography textbooks by Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/893721520<\/a>> # Introduction to modern cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:CreativeWork<\/a>, schema:Book<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"893721520<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/datakryptering<\/a>> ; # Datakryptering<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computer_security<\/a>> ; # Computer security<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/005.82\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/datensicherung<\/a>> ; # Datensicherung<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computers_operating_systems_general<\/a>> ; # COMPUTERS--Operating Systems--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/cryptography<\/a>> ; # Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/it_sakerhet<\/a>> ; # IT-s\u00E4kerhet<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/mathematics_combinatorics<\/a>> ; # MATHEMATICS--Combinatorics<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/kryptologie<\/a>> ; # Kryptologie<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computers_security_cryptography<\/a>> ; # COMPUTERS--Security--Cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computersicherheit<\/a>> ; # Computersicherheit<\/span>\n\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"Second edition.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:contributor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Person\/lindell_yehuda<\/a>> ; # Yehuda Lindell<\/span>\n\u00A0\u00A0\u00A0\nschema:creator<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Person\/katz_jonathan_1974<\/a>> ; # Jonathan Katz<\/span>\n\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2015<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Preface -- I. Introduction and Classical Cryptography -- Introduction -- Perfectly Secret Encryption -- II. Private-Key (Symmetric) Cryptography -- Private-Key Encryption --Message Authentication Codes -- Hash Functions and Applications -- Practical Constructions of Symmetric-Key Primitives -- Theoretical Constructions of Symmetric-Key Primitives -- III. Public-Key (Asymmetric) Cryptography -- Number Theory and Cryptographic Hardness Assumptions -- Algorithms for Factoring and Computing Discrete Logarithms -- Key Management and the Public-Key Revolution -- Public-Key Encryption -- Digital Signature Schemes -- Advanced Topics in Public-Key Encryption -- Index of Common Notation -- Appendix A: Mathematical Background -- Appendix B: Basic Algorithmic Number Theory.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of:Stream ciphers and block ciphers, including modes of operation and design principlesAuthenticated encryption and secure communication sessionsHash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacksThe random-oracle model and its application to several standardized, widely used public-key encryption and signature schemesElliptic-curve cryptography and associated standards such as DSA\/ECDSA and DHIES\/ECIESContaining updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study.\"--<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/114189432<\/a>> ;\u00A0\u00A0\u00A0\nschema:image<\/a> <http:\/\/images.tandf.co.uk\/common\/jackets\/websmall\/978146657\/9781466570269.jpg<\/a>> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Series\/chapman_&_hall_crc_cryptography_and_network_security<\/a>> ; # Chapman & Hall\/CRC cryptography and network security.<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Introduction to modern cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"893721520<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781466570276<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781466570269<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781466570283<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/893721520<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/005.82\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Person\/katz_jonathan_1974<\/a>> # Jonathan Katz<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:birthDate<\/a> \"1974<\/span>\" ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Katz<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Jonathan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Jonathan Katz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Person\/lindell_yehuda<\/a>> # Yehuda Lindell<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Lindell<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Yehuda<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Yehuda Lindell<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Series\/chapman_&_hall_crc_cryptography_and_network_security<\/a>> # Chapman & Hall\/CRC cryptography and network security.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/893721520<\/a>> ; # Introduction to modern cryptography<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chapman & Hall\/CRC cryptography and network security.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Chapman & Hall\/CRC cryptography and network security<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computer_security<\/a>> # Computer security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer security<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computers_operating_systems_general<\/a>> # COMPUTERS--Operating Systems--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Operating Systems--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computers_security_cryptography<\/a>> # COMPUTERS--Security--Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/computersicherheit<\/a>> # Computersicherheit<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computersicherheit<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/cryptography<\/a>> # Cryptography<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cryptography<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/datakryptering<\/a>> # Datakryptering<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Datakryptering<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/datensicherung<\/a>> # Datensicherung<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Datensicherung<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/it_sakerhet<\/a>> # IT-s\u00E4kerhet<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"IT-s\u00E4kerhet<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/kryptologie<\/a>> # Kryptologie<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Kryptologie<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/114189432#Topic\/mathematics_combinatorics<\/a>> # MATHEMATICS--Combinatorics<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"MATHEMATICS--Combinatorics<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/flu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"flu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781466570269<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1466570261<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781466570269<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781466570276<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"146657027X<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781466570276<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781466570283<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1466570288<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781466570283<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n