CryptoSchool Front Cover

CryptoSchool

  • Length: 876 pages
  • Edition: 1st ed. 2015
  • Publisher:
  • Publication Date: 2015-11-20
  • ISBN-10: 3662484234
  • ISBN-13: 9783662484234
  • Sales Rank: #2584651 (See Top 100 Books)
Description

This book offers an introduction to cryptology, the science that makes secure communications possible, and addresses its two complementary aspects: cryptography―–the art of making secure building blocks―–and cryptanalysis―–the art of breaking them. The text describes some of the most important systems in detail, including AES, RSA, group-based and lattice-based cryptography, signatures, hash functions, random generation, and more, providing detailed underpinnings for most of them. With regard to cryptanalysis, it presents a number of basic tools such as the differential and linear methods and lattice attacks.

This text, based on lecture notes from the author’s many courses on the art of cryptography, consists of two interlinked parts. The first, modern part explains some of the basic systems used today and some attacks on them. However, a text on cryptology would not be complete without describing its rich and fascinating history. As such, the colorfully illustrated historical part interspersed throughout the text highlights selected inventions and episodes, providing a glimpse into the past of cryptology.

The first sections of this book can be used as a textbook for an introductory course to computer science or mathematics students. Other sections are suitable for advanced undergraduate or graduate courses. Many exercises are included. The emphasis is on providing reasonably complete explanation of the background for some selected systems.

Table of Contents

Chapter 1 Introduction
Chapter 2 Basic cryptosystems
Chapter A Classical cryptology
Chapter 3 The RSA cryptosystem
Chapter B Key addition and modular arithmetic
Chapter 4 Group cryptography and discrete logarithms
Chapter 5 Elliptic curves
Chapter C Breaking the unbreakable
Chapter 6 Differential and linear cryptanalysis
Chapter 7 Hash functions
Chapter D Codebooks
Chapter 8 Signatures
Chapter 9 Security and reductions
Chapter E Steganography
Chapter 10 Identification and authentication
Chapter F Transposition ciphers
Chapter 11 Random generation
Chapter G Some cryptographers
Chapter 12 Proof systems and zero knowledge
Chapter H People using cryptography
Chapter 13 Integral lattices
Chapter I The Zimmermann telegram
Chapter 14 Quantum computation
Chapter J ENIGMA, Turing, and COLOSSUS
Chapter 15 The computer algebra toolbox

To access the link, solve the captcha.