Title Details: | |
Computational Cryptography |
|
Authors: |
Pagourtzis, Aristeidis Zachos, Efstathios Grontas, Panagiotis |
Reviewer: |
Poulakis, Dimitrios |
Subject: | MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > CRYPTOGRAPHY MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > ALGORITHMS AND COMPLEXITY NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > > ENGINEERING AND TECHNOLOGY > TECHNOLOGICAL SCIENCES AND ENGINEERING > TELECOMMUNICATIONS ENGINEERING AND TECHNOLOGY > DIGITAL COMMUNICATIONS |
Keywords: |
Computational Complexity
Computational Number Theory Symmetric Cryptography Public Key Cryptography Cryptographic Protocols Information Security Network Security Zero-Knowledge Proofs Blockchain Secret Sharing Electronic Voting |
Description: | |
Abstract: |
This book aims to introduce the reader to the fundamental concepts and techniques of modern cryptography, with an emphasis on their algorithmic and computational aspects. Concretely, the book contains the following topics:
- Introduction to basic algorithmic and computational complexity concepts such as: algorithm analysis, efficiency, polynomial time, probabilistic algorithms, complexity classes.
- Elements of number theory and group theory: modular arithmetic, groups, rings, fields, Chinese Remainder Theorem, Fermat's, Euler's, and Lagrange's Theorems, primitive roots, Euler's totient function, quadratic residues, Legendre and Jacobi symbols.
- Computational complexity and algorithms for fundamental number-theoretic problems: repeated squaring, Euclidean and extended Euclidean algorithms, Jacobi symbol computation, roots modulo n, primality tests (Fermat, Solovay-Strassen, Miller-Rabin, AKS algorithm), factorization methods (ρ method, Dixon's method), discrete logarithm (Shanks, Pohling-Hellman, index-calculus).
- Symmetric cryptosystems: block ciphers (DES, AES), stream ciphers, modes of operation.
- Public-key cryptosystems: RSA, ElGamal, Diffie-Hellman key exchange.
- Digital signature schemes: RSA, DSS, special-purpose signatures (one-time, blind, undeniable).
- Cryptographic protocols: secret sharing, coin flipping, key exchange.
- Security proofs based on computational hardness assumptions, security models (KPA, CPA, CCA, IND-CPA, IND-CCA), cryptographic reductions.
- Hash functions and one-way functions: pseudo-randomness.
- Zero-knowledge proofs: identification protocols.
- Advanced topics: quantum and post-quantum cryptography, elliptic curves, protocol composition, bilinear maps, lattice-based cryptography.
|
Type: |
Undergraduate textbook |
Creation Date: | 2015 |
Item Details: | |
ISBN |
978-960-603-276-9 |
License: |
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
DOI | http://dx.doi.org/10.57713/kallipos-492 |
Handle | http://hdl.handle.net/11419/5439 |
Bibliographic Reference: | Pagourtzis, A., Zachos, E., & Grontas, P. (2015). Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://dx.doi.org/10.57713/kallipos-492 |
Language: |
Greek |
Consists of: |
1. Introduction 2. Mathematical Background 3. Computation Complexity Background 4. Algorithms in Cryptography 5. Symmetric Cryptosystems 6. Public – Key Cryptosystems 7. Digital Signatures 8. Hash Functions 9. Cryptographic Protocols 10. Zero-Knowledge Proofs 11. Modern Applications 12. Advanced Topics |
Number of pages |
392 |
Publication Origin: |
Kallipos, Open Academic Editions |
You can also view | |
User comments | |
There are no published comments available! | |