What is included with this book?
Foreword | p. xiii |
Prehistory of Cryptography | p. 1 |
Exercises | p. 1 |
Mappings, etc. | p. 1 |
A Simple Substitution Cryptogram | p. 4 |
Product of Vigenere Ciphers | p. 5 |
One-Time Pad | p. 5 |
Latin Squares | p. 6 |
Enigma | p. 6 |
Solutions | p. 8 |
Conventional Cryptography | p. 17 |
Exercises | p. 17 |
Weak Keys of DES | p. 17 |
Semi-Weak Keys of DES | p. 17 |
Complementation Property of DES | p. 17 |
3DES Exhaustive Search | p. 18 |
2DES and Two-Key 3DES | p. 18 |
Exhaustive Search on 3DES | p. 19 |
An Extension of DES to 128-bit Blocks | p. 20 |
Attack Against the OFB Mode | p. 21 |
Linear Feedback Shift Registers | p. 22 |
Attacks on Cascade Ciphers | p. 23 |
Attacks on Encryption Modes I | p. 24 |
Attacks on Encryption Modes II | p. 28 |
A Variant of A5/1 I | p. 29 |
A Variant of A5/1 II | p. 31 |
Memoryless Exhaustive Search | p. 32 |
Solutions | p. 34 |
Dedicated Conventional Cryptographic Primitives | p. 57 |
Exercises | p. 57 |
Collisions in CBC Mode | p. 57 |
Collisions | p. 57 |
Expected Number of Collisions | p. 58 |
Multicollisions on Hash Functions | p. 58 |
Weak Hash Function Designs | p. 60 |
Collisions on a Modified MD5 | p. 62 |
First Preimage on a Modified MD5 | p. 62 |
Attacks on Yi-Lam Hash Function | p. 62 |
MAC from Block Ciphers | p. 63 |
CFB-MAC | p. 64 |
Universal Hashing | p. 64 |
Solutions | p. 66 |
Conventional Security Analysis | p. 81 |
Exercises | p. 81 |
The SAFER Permutation | p. 81 |
Linear Cryptanalysis | p. 81 |
Differential and Linear Probabilities | p. 82 |
Feistel Schemes | p. 82 |
Impossible Differentials | p. 84 |
Attacks Using Impossible Differential | p. 84 |
Multipermutations | p. 86 |
Orthomorphisms | p. 87 |
Decorrelation | p. 88 |
Decorrelation and Differential Cryptanalysis | p. 89 |
Decorrelation of a Feistel Cipher | p. 89 |
A Saturation Attack against IDEA | p. 89 |
Fault Attack against a Block Cipher | p. 94 |
Solutions | p. 97 |
Security Protocols with Conventional Cryptography | p. 125 |
Exercises | p. 125 |
Flipping a Coin by Email | p. 125 |
Woo-Lam Protocol | p. 126 |
MicroMint I | p. 127 |
MicroMint II | p. 127 |
Bluetooth Pairing Protocol | p. 128 |
UNIX Passwords | p. 128 |
Key Enlargement | p. 128 |
Solutions | p. 130 |
Algorithmic Algebra | p. 135 |
Exercises | p. 135 |
Captain's Age | p. 135 |
Roots in Z*[subscript 77] | p. 135 |
When is Z*[subscript n] Cyclic? | p. 135 |
Finite Fields and AES | p. 137 |
A Special Discrete Logarithm | p. 138 |
Quadratic Residues | p. 138 |
Cubic Residues | p. 139 |
Generating Generators for Z*[subscript p] | p. 139 |
Elliptic Curves and Finite Fields I | p. 140 |
Elliptic Curves and Finite Fields II | p. 141 |
Solutions | p. 142 |
Algorithmic Number Theory | p. 159 |
Exercises | p. 159 |
Rho Method and Distinguished Points | p. 159 |
Factorization | p. 160 |
Prime Numbers | p. 161 |
Factoring n = p [middle dot] q | p. 161 |
Strong Prime Numbers | p. 161 |
Complexity of Eratosthenes Sieve | p. 161 |
Hash Function Based on Arithmetics | p. 164 |
Solutions | p. 165 |
Elements of Complexity Theory | p. 175 |
Exercises | p. 175 |
Regular Language | p. 175 |
Finite State Automaton | p. 175 |
Turing Machine | p. 175 |
Graph Colorability I | p. 176 |
Graph Colorability II | p. 176 |
Solutions | p. 177 |
Public Key Cryptography | p. 181 |
Exercises | p. 181 |
Okamoto-Uchiyama Cryptosystem | p. 181 |
RSA Cryptosystem | p. 182 |
RSA for Paranoids | p. 182 |
RSA - Common Moduli | p. 183 |
Networked RSA | p. 183 |
Repeated RSA Encryption | p. 184 |
Modified Diffie-Hellman | p. 184 |
Rabin Cryptosystem | p. 184 |
Paillier Cryptosystem | p. 185 |
Naccache-Stern Cryptosystem | p. 186 |
Solutions | p. 188 |
Digital Signatures | p. 199 |
Exercises | p. 199 |
Lazy DSS | p. 199 |
DSS Security Hypothesis | p. 199 |
DSS with Unprotected Parameters | p. 200 |
Ong-Schnorr-Shamir Signature | p. 201 |
Batch Verification of DSS Signatures | p. 201 |
Ring Signatures | p. 203 |
Solutions | p. 205 |
Cryptographic Protocols | p. 211 |
Exercises | p. 211 |
Breaking the RDSA Identification Scheme | p. 211 |
A Blind Signature Protocol for a Variant of DSA | p. 213 |
Fiat-Shamir Signature I | p. 215 |
Fiat-Shamir Signature II | p. 216 |
Authenticated Diffie-Hellman Key Agreement Protocol | p. 216 |
Conference Key Distribution System | p. 217 |
Solutions | p. 220 |
From Cryptography to Communication Security | p. 231 |
Exercises | p. 231 |
A Hybrid Cryptosystem Using RSA and DES | p. 231 |
SSL/TLS Cryptography | p. 233 |
Secure Shell (SSH) | p. 235 |
Attack against RC5-CBC-PAD | p. 236 |
Wired Equivalent Privacy (WEP) | p. 237 |
Forging X.509 Certificates | p. 238 |
Solutions | p. 240 |
References | p. 249 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.