| Title Details: | |
|
Introduction |
|
| Authors: |
Zachos, Efstathios Pagourtzis, Aristeidis Grontas, Panagiotis |
| Reviewer: |
Poulakis, Dimitrios |
| Subject: | MATHEMATICS AND COMPUTER SCIENCE > > > MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS AND COMPUTER SCIENCE > > MATHEMATICS AND COMPUTER SCIENCE > > NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > > ENGINEERING AND TECHNOLOGY > > > |
| Description: | |
| Abstract: |
Background. Objectives of Cryptology. Foundations: Bacon, Kerckhoffs Principles, Shannon. Classical Cryptosystems: Transposition and Substitution Systems, Monoalphabetic and Polyalphabetic. Caesar Cipher, Playfair, Vigenère. Product Cryptosystems. Classical Cryptanalysis Techniques: Kasiski Test, Coincidence Index. Types of Attacks: Known Ciphertext, Known Plaintext (KPA), Chosen Plaintext (CPA), Chosen Ciphertext (CCA). Perfect Secrecy according to Shannon. One-time Pad. Block and Stream Cryptosystems. Public Key Cryptography. Theoretical Background: Algorithms, Complexity, Number Theory, Abstract Algebra. Computational Problems in Cryptology.
|
| Type: |
Chapter |
| Creation Date: | 2015 |
| Item Details: | |
| License: |
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0) |
| Handle | http://hdl.handle.net/11419/5440 |
| Bibliographic Reference: | Zachos, E., Pagourtzis, A., & Grontas, P. (2015). Introduction [Chapter]. In Zachos, E., Pagourtzis, A., & Grontas, P. 2015. Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/5440 |
| Language: |
Greek |
| Is Part of: |
Computational Cryptography |
| Publication Origin: |
Kallipos, Open Academic Editions |
