Introduction to Cryptography
|Subject:||MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > FOUNDATIONAL CONCEPTS IN SECURITY MATHEMATICS AND COMPUTER SCIENCE > COMPUTER SCIENCE > INFORMATION ASSURANCE AND SECURITY > CRYPTOGRAPHY|
Public key cryptography
The book covers basic subjects of cryptography. In the first chapter we provide an introduction to cryptography and we provide some applications of modern cryptography. Chapters two, three and four concern private key cryptography, where we provide stream and block ciphers. Furthermore, some necessary security definitions are given. In the fifth chapter we present hash and MAC functions. After the sixth chapter we present public key cryptography. Sixth chapter is devoted to Diffie-Hellman key agreement protocol and chapter seven provides a brief introduction in complexity theory and Turing machine. In chapters eight, nine and ten we present basic elements of number theory which are necessary to understand RSA cryptosystem and digital signatures. In chapter eleven we present RSA trapdoor function and in the next chapter we provide some attacks to RSA, such as Wiener’s attack. In chapter thirteen, an introduction to digital signatures is presented. In chapter fourteen we describe the basic lattice theory and algorithms concerning them, such as LLL, enumeration algorithm with pruning and Babai’s algorithm. Finally, the last chapter is devoted to SSL/TLS and PGP protocols, accordingly we present some applications.
Attribution - NonCommercial - ShareAlike 4.0 International (CC BY-NC-SA 4.0)
|Bibliographic Citation:||Draziotis, K. (2022). Introduction to Cryptography [Undergraduate textbook]. Kallipos, Open Academic Editions. http://dx.doi.org/10.57713/kallipos-17|
1. Why cryptography is useful?
2. Private key cryptography
3. Stream Ciphers
4. Block Ciphers
5. Hash functions & Message Authentication Codes
6. The key exchange problem
7. Complexity & Turing Machines
8. Introduction in number theory
9. Primality Tests
10. Factorization & Discrete logarithm
11. Trapdoor functions (TDF)
12. Attacks in RSA cryptosystem
13. Digital Signatures
15. SSL/TLS & PGP
Kallipos, Open Academic Editions
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.