skip to content
Understanding Cryptography : a Textbook for Students and Practitioners Preview this item
ClosePreview this item
Checking...

Understanding Cryptography : a Textbook for Students and Practitioners

Author: Christof Paar; Jan Pelzl
Publisher: Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2010.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Christof Paar; Jan Pelzl
ISBN: 9783642041013 3642041019 9781280385254 1280385251 9786613563170 661356317X
OCLC Number: 1022042602
Description: 1 online resource
Contents: Foreword; Preface; Acknowledgements; Table of Contents; Introduction to Cryptography and Data Security; Overview of Cryptology (and This Book); Symmetric Cryptography; Basics; Simple Symmetric Encryption: The Substitution Cipher; Cryptanalysis; General Thoughts on Breaking Cryptosystems; How Many Key Bits Are Enough?; Modular Arithmetic and More Historical Ciphers; Modular Arithmetic; Integer Rings; Shift Cipher (or Caesar Cipher); Affine Cipher; Discussion and Further Reading; Lessons Learned; Problems; Stream Ciphers; Introduction; Stream Ciphers vs. Block Ciphers. Encryption and Decryption with Stream CiphersRandom Numbers and an Unbreakable Stream Cipher; Random Number Generators; The One-Time Pad; Towards Practical Stream Ciphers; Shift Register-Based Stream Ciphers; Linear Feedback Shift Registers (LFSR); Known-Plaintext Attack Against Single LFSRs; Trivium; Discussion and Further Reading; Lessons Learned; Problems; The Data Encryption Standard (DES) and Alternatives; Introduction to DES; Confusion and Diffusion; Overview of the DES Algorithm; Internal Structure of DES; Initial and Final Permutation; The f-Function; Key Schedule; Decryption. Security of DESExhaustive Key Search; Analytical Attacks; Implementation in Software and Hardware; DES Alternatives; The Advanced Encryption Standard (AES) and the AES Finalist Ciphers; Triple DES (3DES) and DESX; Lightweight Cipher PRESENT; Discussion and Further Reading; Lessons Learned; Problems; The Advanced Encryption Standard (AES); Introduction; Overview of the AES Algorithm; Some Mathematics: A Brief Introduction to Galois Fields; Existence of Finite Fields; Prime Fields; Extension Fields GF(2m); Addition and Subtraction in GF(2m); Multiplication in GF(2m); Inversion in GF(2m). Internal Structure of AESByte Substitution Layer; Diffusion Layer; Key Addition Layer; Key Schedule; Decryption; Implementation in Software and Hardware; Discussion and Further Reading; Lessons Learned; Problems; More About Block Ciphers; Encryption with Block Ciphers: Modes of Operation; Electronic Codebook Mode (ECB); Cipher Block Chaining Mode (CBC); Output Feedback Mode (OFB); Cipher Feedback Mode (CFB); Counter Mode (CTR); Galois Counter Mode (GCM); Exhaustive Key Search Revisited; Increasing the Security of Block Ciphers; Double Encryption and Meet-in-the-Middle Attack. Triple EncryptionKey Whitening; Discussion and Further Reading; Lessons Learned; Problems; Introduction to Public-Key Cryptography; Symmetric vs. Asymmetric Cryptography; Practical Aspects of Public-Key Cryptography; Security Mechanisms; The Remaining Problem: Authenticity of Public Keys; Important Public-Key Algorithms; Key Lengths and Security Levels; Essential Number Theory for Public-Key Algorithms; Euclidean Algorithm; Extended Euclidean Algorithm; Euler's Phi Function; Fermat's Little Theorem and Euler's Theorem; Discussion and Further Reading; Lessons Learned; Problems.
Responsibility: by Christof Paar, Jan Pelzl.

Abstract:

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1022042602> # Understanding Cryptography : a Textbook for Students and Practitioners
    a schema:MediaObject, schema:Book, schema:CreativeWork ;
    library:oclcnum "1022042602" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/423428372#Place/berlin_heidelberg> ; # Berlin, Heidelberg
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/423428372#Topic/computer_science> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/423428372#Topic/systems_engineering> ; # Systems engineering
    schema:about <http://id.loc.gov/authorities/classification/Z103> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/423428372#Topic/data_structures_computer_science> ; # Data structures (Computer science)
    schema:about <http://dewey.info/class/005.82/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/423428372#Topic/data_protection> ; # Data protection
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/423428372#Person/pelzl_jan> ; # Jan Pelzl
    schema:creator <http://experiment.worldcat.org/entity/work/data/423428372#Person/paar_christof> ; # Christof Paar
    schema:datePublished "2010" ;
    schema:description "Foreword; Preface; Acknowledgements; Table of Contents; Introduction to Cryptography and Data Security; Overview of Cryptology (and This Book); Symmetric Cryptography; Basics; Simple Symmetric Encryption: The Substitution Cipher; Cryptanalysis; General Thoughts on Breaking Cryptosystems; How Many Key Bits Are Enough?; Modular Arithmetic and More Historical Ciphers; Modular Arithmetic; Integer Rings; Shift Cipher (or Caesar Cipher); Affine Cipher; Discussion and Further Reading; Lessons Learned; Problems; Stream Ciphers; Introduction; Stream Ciphers vs. Block Ciphers."@en ;
    schema:description "Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/423428372> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/423428372#CreativeWork/> ;
    schema:name "Understanding Cryptography : a Textbook for Students and Practitioners"@en ;
    schema:productID "1022042602" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1022042602#PublicationEvent/berlin_heidelberg_springer_verlag_berlin_heidelberg_2010> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/423428372#Agent/springer_verlag_berlin_heidelberg> ; # Springer-Verlag Berlin Heidelberg
    schema:url <https://link.springer.com/openurl?genre=book&isbn=978-3-642-04100-6> ;
    schema:url <http://www.myilibrary.com?id=356317> ;
    schema:url <http://libproxy.uwyo.edu/login/?url=http://dx.doi.org/10.1007/978-3-642-04101-3> ;
    schema:workExample <http://worldcat.org/isbn/9781280385254> ;
    schema:workExample <http://worldcat.org/isbn/9783642041013> ;
    schema:workExample <http://worldcat.org/isbn/9786613563170> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1022042602> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/423428372#Agent/springer_verlag_berlin_heidelberg> # Springer-Verlag Berlin Heidelberg
    a bgn:Agent ;
    schema:name "Springer-Verlag Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/423428372#Person/paar_christof> # Christof Paar
    a schema:Person ;
    schema:familyName "Paar" ;
    schema:givenName "Christof" ;
    schema:name "Christof Paar" ;
    .

<http://experiment.worldcat.org/entity/work/data/423428372#Person/pelzl_jan> # Jan Pelzl
    a schema:Person ;
    schema:familyName "Pelzl" ;
    schema:givenName "Jan" ;
    schema:name "Jan Pelzl" ;
    .

<http://experiment.worldcat.org/entity/work/data/423428372#Place/berlin_heidelberg> # Berlin, Heidelberg
    a schema:Place ;
    schema:name "Berlin, Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/423428372#Topic/data_structures_computer_science> # Data structures (Computer science)
    a schema:Intangible ;
    schema:name "Data structures (Computer science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/423428372#Topic/systems_engineering> # Systems engineering
    a schema:Intangible ;
    schema:name "Systems engineering"@en ;
    .

<http://worldcat.org/entity/work/data/423428372#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/1022042602> ; # Understanding Cryptography : a Textbook for Students and Practitioners
    .

<http://worldcat.org/isbn/9781280385254>
    a schema:ProductModel ;
    schema:isbn "1280385251" ;
    schema:isbn "9781280385254" ;
    .

<http://worldcat.org/isbn/9783642041013>
    a schema:ProductModel ;
    schema:isbn "3642041019" ;
    schema:isbn "9783642041013" ;
    .

<http://worldcat.org/isbn/9786613563170>
    a schema:ProductModel ;
    schema:isbn "661356317X" ;
    schema:isbn "9786613563170" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.