Whether you're new to the field or looking to broaden your knowledge of contemporary cryptography, this newly revised edition of an Artech House classic puts all aspects of this important topic into perspective. Delivering an accurate introduction to the current state-of-the-art in modern cryptography, the book offers you an in-depth understanding of essential tools and applications to help you with your daily work. The second edition has been reorganized and expanded, providing mathematical fundamentals and important cryptography principles in the appropriate appendixes, rather than summarized at the beginning of the book. Now you find all the details you need to fully master the material in the relevant sections. This allows you to quickly delve into the practical information you need for your projects. Covering unkeyed, secret key, and public key cryptosystems, this authoritative reference gives you solid working knowledge of the latest and most critical concepts, techniques, and systems in contemporary cryptography. Additionally, the book is supported with over 720 equations, more than 60 illustrations, and numerous time-saving URLs that connect you to websites with related information.
Introduction - Cryptology. Cryptographic Systems. Historical Background Information. Outline of the Book. ; Cryptographic Systems - Unkeyed Cryptosystems. Secret Key Cryptosystems. Public Key Cryptosystems. Final Remarks. ; One-Way Functions -Introduction. Candidate One-Way Functions. Integer Factorization Algorithms. Algorithms for Computing Discrete Logarithms. Hard-Core Predicates. Elliptic Curve Cryptography. Final Remarks. ; Cryptographic Hash Functions -Introduction. Merkle-Damg¬8ard Construction. Exemplary Cryptographic Hash Functions. Final Remarks. ; Random Bit Generators -Introduction. Realizations and Implementations. Statistical Randomness Testing. Final Remarks. ; Symmetric Encryption Systems -Introduction. Block Ciphers. Stream Ciphers. Perfectly Secure Encryption. Final Remarks. ; Message Authentication Codes -Introduction. Computationally Secure MACs. Information-Theoretically Secure MACs. Final Remarks. ; Pseudorandom Bit Generators -Introduction. Exemplary Constructions. Cryptographically Secure PRBGs. Final Remarks. ; Pseudorandom Functions -Introduction. Constructions. Random Oracle Model. Final Remarks.; Asymmetric Encryption Systems -Introduction. Basic Systems. Secure Systems. Identity-Based Encryption. Homomorphic Encryption. Final Remarks. ; Digital Signature Systems -Introduction. Basic Systems. Provably Secure Systems. Identity-Based Signatures. One-Time Signatures. Digital Signatures for Streams. Variants. Final Remarks. ; Key Establishment -Introduction. Key Distribution Protocols. Key Agreement Protocols. Quantum Cryptography. Final Remarks. ; Entity Authentication -Introduction. Authentication Technologies. Zero-Knowledge Authentication Protocols. Final Remarks. ; Secure Multiparty Computation -Introduction. Major Results. Final Remarks. ; Key Management -Introduction. Key Life Cycle. Secret Sharing. Key Recovery. Public Key Infrastructure. Final Remarks. ; Summary - Unkeyed Cryptosystems. Secret Key Cryptosystems. Public Key Cryptosystems. Final Remarks. ; Outlook - Theoretical Viewpoint. Practical Viewpoint. ; Appendices. List of Symbols. Abbreviations and Acronyms. About the Author. Index;