Public Key Cryptography Applications and Attacks 1st Edition by Lynn Margaret Batten – Ebook PDF Instant Download/Delivery: 1118317129, 978-1118317129
Full dowload Public Key Cryptography Applications and Attacks 1st Edition after payment
Product details:
ISBN 10: 1118317129
ISBN 13: 978-1118317129
Author: Lynn Margaret Batten
Public Key Cryptography Applications and Attacks 1st Table of contents:
Chapter 0: Introduction
This introductory chapter defines cryptography and lays out its importance. Topics include:
- The Meaning of Cryptography: An overview of cryptography’s role in securing information.
- Symmetric Key Cryptography: Explanation of systems using a single, shared key for encryption and decryption.
- Public Key (Asymmetric) Cryptography: Introduction to cryptographic systems that use separate keys for encryption and decryption.
- Key Establishment: How cryptographic keys are securely exchanged or established.
- Beyond Secret Hiding: Other applications of cryptography.
- Standards and Attacks: Overview of cryptographic standards and types of attacks on cryptographic systems.
Chapter 1: Congruence Equations
This chapter covers congruence arithmetic and its applications in cryptography.
- Congruence Arithmetic: Basics of modular arithmetic with examples and problem sets.
- Euclidean Algorithm and Inverses: Techniques to find modular inverses using the Euclidean algorithm.
- Discrete Logarithms and Diffie-Hellman: Introduction to discrete logarithms and their application in the Diffie-Hellman key exchange.
- Attacking the Discrete Logarithm: Examination of techniques for attacking discrete logarithm-based systems.
Chapter 2: The ElGamal Scheme
Focuses on the ElGamal encryption scheme.
- Primitive Roots: Explanation of primitive roots, their role in cryptographic schemes, with exercises.
- ElGamal Encryption and Security: Steps of the ElGamal encryption process, security aspects, and potential vulnerabilities.
Chapter 3: The RSA Scheme
This chapter details the RSA encryption scheme and its underlying mathematical principles.
- Euler’s Theorem: Application of Euler’s theorem in the RSA algorithm.
- RSA Algorithm and Security: Steps for RSA encryption and decryption, along with a discussion on security.
- Implementing RSA: Practical aspects and considerations when implementing RSA in real-world applications.
Chapter 4: Elliptic Curve Cryptography (ECC)
Explains Elliptic Curve Cryptography, a powerful modern cryptographic method.
- Elliptic Curves and Groups: Mathematical basis for elliptic curves and their group properties.
- Elliptic Curve Cryptography Applications: Applications of ECC in secure communications.
- Elliptic Curve Factoring Scheme: Using elliptic curves for factoring, which has implications for cryptographic security.
Chapter 5: Digital Signatures
Covers digital signatures and the cryptographic hash functions that underpin them.
- Hash Functions: Description of cryptographic hash functions, their importance, and examples.
- Digital Signature Schemes: Explanation of digital signature creation and verification processes.
- Attacks on Digital Signatures: Different types of attacks that target the security of digital signatures.
Chapter 6: Primality Testing
This chapter discusses primality testing methods used in cryptography.
- Fermat’s Approach and Wilson’s Theorem: Basic tests for determining if a number is prime.
- Miller-Rabin and Other Probabilistic Tests: Description of probabilistic primality tests.
- True Primality Tests and Mersenne Primes: Methods to determine true primes and tests specific to Mersenne primes.
Chapter 7: Factoring Methods
Examines various factoring methods critical to breaking cryptographic systems.
- Fermat’s Method: Introduction to Fermat’s approach to factoring.
- Quadratic Sieve and Pollard’s Methods: Advanced methods such as the quadratic sieve and Pollard’s algorithms.
- Continued Fractions: Use of continued fractions in the context of factoring.
People also search for Public Key Cryptography Applications and Attacks 1st :
principles of public key cryptography
how does public key cryptography work
explain public key cryptography
private and public key cryptography
in public key cryptography a key that decrypts the message
Tags:
Lynn Margaret Batten,Public Key,Cryptography,Applications,Attacks 1st