## Find a copy online

### Links to this item

## Find a copy in the library

Finding libraries that hold this item...

## Details

Genre/Form: | Electronic books |
---|---|

Additional Physical Format: | Print version: |

Material Type: | Document, Internet resource |

Document Type: | Internet Resource, Computer File |

All Authors / Contributors: |
Christof Paar; Jan Pelzl |

ISBN: | 9783642041013 3642041019 9781280385254 1280385251 9786613563170 661356317X |

OCLC Number: | 1022042602 |

Description: | 1 online resource |

Contents: | Foreword; Preface; Acknowledgements; Table of Contents; Introduction to Cryptography and Data Security; Overview of Cryptology (and This Book); Symmetric Cryptography; Basics; Simple Symmetric Encryption: The Substitution Cipher; Cryptanalysis; General Thoughts on Breaking Cryptosystems; How Many Key Bits Are Enough?; Modular Arithmetic and More Historical Ciphers; Modular Arithmetic; Integer Rings; Shift Cipher (or Caesar Cipher); Affine Cipher; Discussion and Further Reading; Lessons Learned; Problems; Stream Ciphers; Introduction; Stream Ciphers vs. Block Ciphers. Encryption and Decryption with Stream CiphersRandom Numbers and an Unbreakable Stream Cipher; Random Number Generators; The One-Time Pad; Towards Practical Stream Ciphers; Shift Register-Based Stream Ciphers; Linear Feedback Shift Registers (LFSR); Known-Plaintext Attack Against Single LFSRs; Trivium; Discussion and Further Reading; Lessons Learned; Problems; The Data Encryption Standard (DES) and Alternatives; Introduction to DES; Confusion and Diffusion; Overview of the DES Algorithm; Internal Structure of DES; Initial and Final Permutation; The f-Function; Key Schedule; Decryption. Security of DESExhaustive Key Search; Analytical Attacks; Implementation in Software and Hardware; DES Alternatives; The Advanced Encryption Standard (AES) and the AES Finalist Ciphers; Triple DES (3DES) and DESX; Lightweight Cipher PRESENT; Discussion and Further Reading; Lessons Learned; Problems; The Advanced Encryption Standard (AES); Introduction; Overview of the AES Algorithm; Some Mathematics: A Brief Introduction to Galois Fields; Existence of Finite Fields; Prime Fields; Extension Fields GF(2m); Addition and Subtraction in GF(2m); Multiplication in GF(2m); Inversion in GF(2m). Internal Structure of AESByte Substitution Layer; Diffusion Layer; Key Addition Layer; Key Schedule; Decryption; Implementation in Software and Hardware; Discussion and Further Reading; Lessons Learned; Problems; More About Block Ciphers; Encryption with Block Ciphers: Modes of Operation; Electronic Codebook Mode (ECB); Cipher Block Chaining Mode (CBC); Output Feedback Mode (OFB); Cipher Feedback Mode (CFB); Counter Mode (CTR); Galois Counter Mode (GCM); Exhaustive Key Search Revisited; Increasing the Security of Block Ciphers; Double Encryption and Meet-in-the-Middle Attack. Triple EncryptionKey Whitening; Discussion and Further Reading; Lessons Learned; Problems; Introduction to Public-Key Cryptography; Symmetric vs. Asymmetric Cryptography; Practical Aspects of Public-Key Cryptography; Security Mechanisms; The Remaining Problem: Authenticity of Public Keys; Important Public-Key Algorithms; Key Lengths and Security Levels; Essential Number Theory for Public-Key Algorithms; Euclidean Algorithm; Extended Euclidean Algorithm; Euler's Phi Function; Fermat's Little Theorem and Euler's Theorem; Discussion and Further Reading; Lessons Learned; Problems. |

Responsibility: | by Christof Paar, Jan Pelzl. |

### Abstract:

Cryptography is now ubiquitous - moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography. After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations. The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

## Reviews

*User-contributed reviews*

Add a review and share your thoughts with other readers.
Be the first.

Add a review and share your thoughts with other readers.
Be the first.

## Tags

Add tags for "Understanding Cryptography : a Textbook for Students and Practitioners".
Be the first.