Ulteriori informazioni
Zusatztext "This book contains a nice introduction to modern cryptography! with emphasis laid on the ciphers based on computational number theory. ? The reader learns to deal with large numbers in a computer and to analyze the complexity of the most basic algorithms. ? [T]he reader is not just confronted with a list of algorithms! but he/she is given the clues to assimilate the ideas behind the results ? . The book contains more than 200 interesting exercises that test the reader's understanding of the text." - Zentralblatt MATH! 1045 "The book provides an excellent text concerning cryptanalysis. ? masterly and carefully written. As the proofs are given with full details ? I can recommend it also to students." - Monatshefte fur Mathematik Informationen zum Autor Samuel S. Wagstaff, Jr. is a professor at the Purdue University Center for Education and Research in Information Assurance and Security (CERIAS) in West Lafayette, Indiana. Klappentext At the heart of modern cryptographic algorithms lies computational number theory. Written by a number theorist and practicing cryptographer, this book takes readers from basic number theory through the inner workings of ciphers and protocols, to their strengths and weaknesses. Zusammenfassung At the heart of modern cryptographic algorithms lies computational number theory. Written by a number theorist and practicing cryptographer, this book takes readers from basic number theory through the inner workings of ciphers and protocols, to their strengths and weaknesses. Inhaltsverzeichnis MATHEMATICAL FOUNDATIONS OF CRYPTANALYSIS. Terminology of Cryptography. Probability Theory. Divisibility and Arithmetic. Primes. Congruences. Euler's Theorem and Its Consequences. Second Degree Congruences. Information Theory. Groups, Rings and Fields. Finding Large Primes. Exponential Methods of Factoring Integers. Elliptic Curves. Subexponential Factoring Algorithms. Computing Discrete Logarithms. Random Number Generation. THE CRYPTOGRAPHIC ALGORITHMS. Private Key Algorithms. Public Key Algorithms. Signature Algorithms. Key Exchange Algorithms. Simple Protocols. Complicated Protocols. Complete Systems. METHODS OF ATTACK. Direct Attacks. Exploiting a User Error. Active Attacks. References....