密码学导论,第二版

R. Mollin
{"title":"密码学导论,第二版","authors":"R. Mollin","doi":"10.1201/9781420011241","DOIUrl":null,"url":null,"abstract":"As the title states the book by Johannes Buchmann provides an introduction to cryptography. Buchmann’s text in only 324 pages (excluding the appendices) presents a stand alone introduction to some modern cryptographic methods. The book begins with the mathematical background that will be used as foundation for the cryptographic methods discussed in this book. Chapter one explains the important properties of integers and the extended Euclidean algorithm. Chapter two includes some important algebraic definitions (groups, residue class, ring, fields,...). Also, it contains algorithms for fast evaluation of power products and the Chinese remainder theorem. Probability theory and Shannon’s view of perfect secrecy are presented in chapter 4. There are three chapters discussing symmetric cryptography and to be more specific they are devoted to block ciphers. Chapter 3 explains the meaning of cryptosystems and gives some different encryption schemes. For the symmetric cryptography the author just defines the structure of stream ciphers and provides two examples, whereas he explains the block cipher in more details. Moreover chapter 5 and chapter 6 represent a complete study to the most famous block ciphers DES and AES, respectively. In the next four chapters, the author discusses asymmetric cryptography (public key cryptography). Since many public key cryptosystems use large prime numbers, the author gives more additional mathematical preliminaries for the prime number generation and some algorithms used for testing the primality of large numbers in chapter 7. The idea of public key cryptosystems and a description to the most important schemes are given in chapter 8, for examples RSA and ElGamal. The security of RSA is based on the difficulty of the factorization problem and is studied in chapter 9. It is focusing on the quadratic sieve algorithm and providing an estimation to the efficiency of it and some other factoring algorithms. Similarly, in chapter 10 the security analysis of ElGamal cryptosystem is discussed by analyzing the algorithms that solve the discrete logarithm problem.","PeriodicalId":430406,"journal":{"name":"Discrete Mathematics and Its Applications","volume":"100 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"37","resultStr":"{\"title\":\"An introduction to cryptography, Second Edition\",\"authors\":\"R. Mollin\",\"doi\":\"10.1201/9781420011241\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"As the title states the book by Johannes Buchmann provides an introduction to cryptography. Buchmann’s text in only 324 pages (excluding the appendices) presents a stand alone introduction to some modern cryptographic methods. The book begins with the mathematical background that will be used as foundation for the cryptographic methods discussed in this book. Chapter one explains the important properties of integers and the extended Euclidean algorithm. Chapter two includes some important algebraic definitions (groups, residue class, ring, fields,...). Also, it contains algorithms for fast evaluation of power products and the Chinese remainder theorem. Probability theory and Shannon’s view of perfect secrecy are presented in chapter 4. There are three chapters discussing symmetric cryptography and to be more specific they are devoted to block ciphers. Chapter 3 explains the meaning of cryptosystems and gives some different encryption schemes. For the symmetric cryptography the author just defines the structure of stream ciphers and provides two examples, whereas he explains the block cipher in more details. Moreover chapter 5 and chapter 6 represent a complete study to the most famous block ciphers DES and AES, respectively. In the next four chapters, the author discusses asymmetric cryptography (public key cryptography). Since many public key cryptosystems use large prime numbers, the author gives more additional mathematical preliminaries for the prime number generation and some algorithms used for testing the primality of large numbers in chapter 7. The idea of public key cryptosystems and a description to the most important schemes are given in chapter 8, for examples RSA and ElGamal. The security of RSA is based on the difficulty of the factorization problem and is studied in chapter 9. It is focusing on the quadratic sieve algorithm and providing an estimation to the efficiency of it and some other factoring algorithms. Similarly, in chapter 10 the security analysis of ElGamal cryptosystem is discussed by analyzing the algorithms that solve the discrete logarithm problem.\",\"PeriodicalId\":430406,\"journal\":{\"name\":\"Discrete Mathematics and Its Applications\",\"volume\":\"100 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1900-01-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"37\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Discrete Mathematics and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1201/9781420011241\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Discrete Mathematics and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1201/9781420011241","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 37

摘要

正如书名所述,约翰内斯·布克曼的这本书提供了密码学的介绍。Buchmann的文本只有324页(不包括附录),对一些现代密码方法进行了独立的介绍。这本书开始与数学背景,将被用作基础的密码学方法在这本书中讨论。第一章解释了整数的重要性质和扩展欧几里得算法。第二章介绍了一些重要的代数定义(群、剩余类、环、域等)。此外,它还包含幂乘积的快速求值算法和中国剩余定理。第四章介绍了概率论和香农的完全保密论。有三章讨论对称密码学,更具体地说,他们专门讨论分组密码。第三章解释了密码系统的含义,并给出了一些不同的加密方案。对于对称密码学,作者只定义了流密码的结构并给出了两个例子,而对分组密码进行了详细的解释。此外,第五章和第六章分别对最著名的分组密码DES和AES进行了完整的研究。在接下来的四章中,作者讨论了非对称加密(公钥加密)。由于许多公钥密码系统使用大素数,作者在第7章中给出了更多的素数生成的数学基础和一些用于测试大数的素数的算法。第8章给出了公钥密码系统的思想和对最重要的方案的描述,例如RSA和ElGamal。RSA的安全性基于分解问题的难易程度,在第9章中进行了研究。重点介绍了二次筛算法,并对二次筛算法和其他因子分解算法的效率进行了估计。同样,在第10章中,通过分析解决离散对数问题的算法,讨论了ElGamal密码系统的安全性分析。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An introduction to cryptography, Second Edition
As the title states the book by Johannes Buchmann provides an introduction to cryptography. Buchmann’s text in only 324 pages (excluding the appendices) presents a stand alone introduction to some modern cryptographic methods. The book begins with the mathematical background that will be used as foundation for the cryptographic methods discussed in this book. Chapter one explains the important properties of integers and the extended Euclidean algorithm. Chapter two includes some important algebraic definitions (groups, residue class, ring, fields,...). Also, it contains algorithms for fast evaluation of power products and the Chinese remainder theorem. Probability theory and Shannon’s view of perfect secrecy are presented in chapter 4. There are three chapters discussing symmetric cryptography and to be more specific they are devoted to block ciphers. Chapter 3 explains the meaning of cryptosystems and gives some different encryption schemes. For the symmetric cryptography the author just defines the structure of stream ciphers and provides two examples, whereas he explains the block cipher in more details. Moreover chapter 5 and chapter 6 represent a complete study to the most famous block ciphers DES and AES, respectively. In the next four chapters, the author discusses asymmetric cryptography (public key cryptography). Since many public key cryptosystems use large prime numbers, the author gives more additional mathematical preliminaries for the prime number generation and some algorithms used for testing the primality of large numbers in chapter 7. The idea of public key cryptosystems and a description to the most important schemes are given in chapter 8, for examples RSA and ElGamal. The security of RSA is based on the difficulty of the factorization problem and is studied in chapter 9. It is focusing on the quadratic sieve algorithm and providing an estimation to the efficiency of it and some other factoring algorithms. Similarly, in chapter 10 the security analysis of ElGamal cryptosystem is discussed by analyzing the algorithms that solve the discrete logarithm problem.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信