Κεφάλαιο 1Adobe PDF (347.42 kB)
Title Details:
Introduction
Authors: Zachos, Efstathios
Pagourtzis, Aristeidis
Grontas, Panagiotis
Reviewer: Poulakis, Dimitrios
Subject: MATHEMATICS AND COMPUTER SCIENCE > > >
MATHEMATICS AND COMPUTER SCIENCE > MATHEMATICS > NUMBER THEORY > COMPUTATIONAL NUMBER THEORY
MATHEMATICS AND COMPUTER SCIENCE >
MATHEMATICS AND COMPUTER SCIENCE > >
MATHEMATICS AND COMPUTER SCIENCE > >
NATURAL SCIENCES AND AGRICULTURAL SCIENCES > PHYSICS > INDERDISCIPLINARY PHYSICS AND RELATED AREAS OF SCIENCE AND TECHNOLOGY > >
ENGINEERING AND TECHNOLOGY > > >
Description:
Abstract:
Background. Objectives of Cryptology. Foundations: Bacon, Kerckhoffs Principles, Shannon. Classical Cryptosystems: Transposition and Substitution Systems, Monoalphabetic and Polyalphabetic. Caesar Cipher, Playfair, Vigenère. Product Cryptosystems. Classical Cryptanalysis Techniques: Kasiski Test, Coincidence Index. Types of Attacks: Known Ciphertext, Known Plaintext (KPA), Chosen Plaintext (CPA), Chosen Ciphertext (CCA). Perfect Secrecy according to Shannon. One-time Pad. Block and Stream Cryptosystems. Public Key Cryptography. Theoretical Background: Algorithms, Complexity, Number Theory, Abstract Algebra. Computational Problems in Cryptology.
Type: Chapter
Creation Date: 2015
Item Details:
License: Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
Handle http://hdl.handle.net/11419/5440
Bibliographic Reference: Zachos, E., Pagourtzis, A., & Grontas, P. (2015). Introduction [Chapter]. In Zachos, E., Pagourtzis, A., & Grontas, P. 2015. Computational Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. https://hdl.handle.net/11419/5440
Language: Greek
Is Part of: Computational Cryptography
Publication Origin: Kallipos, Open Academic Editions