Cryptography plays a key role in ensuring the privacy and integrity of data and the security of computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
目錄
Introduction and Classical Cryptography p. 1
Introduction p. 3
Perfectly-Secret Encryption p. 29
Private-Key (Symmetric) Cryptography p. 45
Private-Key Encryption and Pseudorandomness p. 47
Message Authentication Codes and Collision-Resistant Hash Functions p. 111
Practical Constructions of Pseudorandom Permutations (Block Ciphers) p. 159
Theoretical Constructions of Pseudorandom Objects p. 193
Public-Key (Asymmetric) Cryptography p. 241
Number Theory and Cryptographic Hardness Assumptions p. 243
Factoring and Computing Discrete Logarithms p. 297
Private-Key Management and the Public-Key Revolution p. 315
Public-Key Encryption p. 333
Additional Public-Key Encryption Schemes p. 385
Digital Signature Schemes p. 421
Public-Key Cryptosystems in the Random Oracle Model p. 457
Mathematical Background p. 493
Supplementary Algorithmic Number Theory p. 499
Table of Contents provided by Blackwell. All Rights Reserved.
Introduction and Classical Cryptography p. 1
Introduction p. 3
Perfectly-Secret Encryption p. 29
Private-Key (Symmetric) Cryptography p. 45
Private-Key Encryption and Pseudorandomness p. 47
Message Authentication Codes and Collision-Resistant Hash Functions p. 111
Practical Constructions of Pseudorandom Permutations (Block Ciphers) p. 159
Theoretical Constructions of Pseudorandom Objects p. 193
Public-Key (Asymmetric) Cryptography p. 241
Number Theory and Cryptographic Hardness Assumptions p. 24...