Adobe PDF (20.76 MB)
Introduction to Cryptography
|Subject:||MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > FOUNDATIONAL CONCEPTS IN SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > CRYPTOGRAPHY NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > ELECTROMAGNETISM, OPTICS, ACOUSTIC, HEAT TRANSFER, CLASSICAL MECHANICS, AND FLUID DYNAMICS > ELECTROMAGNETISM|
Public key cryptography
The book covers basic subjects of cryptography. In the first chapter we provide an introduction to cryptography and we provide some applications of modern cryptography. Chapters two, three and four concern private key cryptography, where we provide stream and block ciphers. Furthermore, some necessary security definitions are given. In the fifth chapter we present hash and MAC functions. After the sixth chapter we present public key cryptography. Sixth chapter is devoted to Diffie-Hellman key agreement protocol and chapter seven provides a brief introduction in complexity theory and Turing machine. In chapters eight, nine and ten we present basic elements of number theory which are necessary to understand RSA cryptosystem and digital signatures. In chapter eleven we present RSA trapdoor function and in the next chapter we provide some attacks to RSA, such as Wiener’s attack. In chapter thirteen, an introduction to digital signatures is presented. In chapter fourteen we describe the basic lattice theory and algorithms concerning them, such as LLL, enumeration algorithm with pruning and Babai’s algorithm. Finally, the last chapter is devoted to SSL/TLS and PGP protocols, accordingly we present some applications.
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
|Bibliographic Reference:||Draziotis, K. (2022). Introduction to Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/8016|
Kallipos, Open Academic Editions
|Usage statistics :|
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.