did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780387279343

A Classical Introduction to Cryptography Exercise Book

by ; ; ; ;
  • ISBN13:

    9780387279343

  • ISBN10:

    0387279342

  • Format: Hardcover
  • Copyright: 2005-12-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $54.99 Save up to $38.11
  • Digital
    $36.56
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This companion exercise and solution book to A Classical Introduction to Cryptography: Applications for Communications Security contains a carefully revised version of teaching material used by the authors and given as examinations to advanced-level students of the Cryptography and Security Lecture at EPFL from 2000 to mid-2005.A Classical Introduction to Cryptography Exercise Book covers a majority of the subjects that make up today's cryptology, including symmetric or public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems. Exercises do not require an extensive background in mathematics, since the most important notions are introduced and discussed in many of the exercises.The authors expect the readers to be comfortable with basic facts of discrete probability theory, discrete mathematics, calculus, algebra, and computer science. Following the model of A Classical Introduction to Cryptography: Applications for Communications Security, exercises related to the more advanced parts of the textbook are marked with a star.

Table of Contents

Forewordp. xiii
Prehistory of Cryptographyp. 1
Exercisesp. 1
Mappings, etc.p. 1
A Simple Substitution Cryptogramp. 4
Product of Vigenere Ciphersp. 5
One-Time Padp. 5
Latin Squaresp. 6
Enigmap. 6
Solutionsp. 8
Conventional Cryptographyp. 17
Exercisesp. 17
Weak Keys of DESp. 17
Semi-Weak Keys of DESp. 17
Complementation Property of DESp. 17
3DES Exhaustive Searchp. 18
2DES and Two-Key 3DESp. 18
Exhaustive Search on 3DESp. 19
An Extension of DES to 128-bit Blocksp. 20
Attack Against the OFB Modep. 21
Linear Feedback Shift Registersp. 22
Attacks on Cascade Ciphersp. 23
Attacks on Encryption Modes Ip. 24
Attacks on Encryption Modes IIp. 28
A Variant of A5/1 Ip. 29
A Variant of A5/1 IIp. 31
Memoryless Exhaustive Searchp. 32
Solutionsp. 34
Dedicated Conventional Cryptographic Primitivesp. 57
Exercisesp. 57
Collisions in CBC Modep. 57
Collisionsp. 57
Expected Number of Collisionsp. 58
Multicollisions on Hash Functionsp. 58
Weak Hash Function Designsp. 60
Collisions on a Modified MD5p. 62
First Preimage on a Modified MD5p. 62
Attacks on Yi-Lam Hash Functionp. 62
MAC from Block Ciphersp. 63
CFB-MACp. 64
Universal Hashingp. 64
Solutionsp. 66
Conventional Security Analysisp. 81
Exercisesp. 81
The SAFER Permutationp. 81
Linear Cryptanalysisp. 81
Differential and Linear Probabilitiesp. 82
Feistel Schemesp. 82
Impossible Differentialsp. 84
Attacks Using Impossible Differentialp. 84
Multipermutationsp. 86
Orthomorphismsp. 87
Decorrelationp. 88
Decorrelation and Differential Cryptanalysisp. 89
Decorrelation of a Feistel Cipherp. 89
A Saturation Attack against IDEAp. 89
Fault Attack against a Block Cipherp. 94
Solutionsp. 97
Security Protocols with Conventional Cryptographyp. 125
Exercisesp. 125
Flipping a Coin by Emailp. 125
Woo-Lam Protocolp. 126
MicroMint Ip. 127
MicroMint IIp. 127
Bluetooth Pairing Protocolp. 128
UNIX Passwordsp. 128
Key Enlargementp. 128
Solutionsp. 130
Algorithmic Algebrap. 135
Exercisesp. 135
Captain's Agep. 135
Roots in Z*[subscript 77]p. 135
When is Z*[subscript n] Cyclic?p. 135
Finite Fields and AESp. 137
A Special Discrete Logarithmp. 138
Quadratic Residuesp. 138
Cubic Residuesp. 139
Generating Generators for Z*[subscript p]p. 139
Elliptic Curves and Finite Fields Ip. 140
Elliptic Curves and Finite Fields IIp. 141
Solutionsp. 142
Algorithmic Number Theoryp. 159
Exercisesp. 159
Rho Method and Distinguished Pointsp. 159
Factorizationp. 160
Prime Numbersp. 161
Factoring n = p [middle dot] qp. 161
Strong Prime Numbersp. 161
Complexity of Eratosthenes Sievep. 161
Hash Function Based on Arithmeticsp. 164
Solutionsp. 165
Elements of Complexity Theoryp. 175
Exercisesp. 175
Regular Languagep. 175
Finite State Automatonp. 175
Turing Machinep. 175
Graph Colorability Ip. 176
Graph Colorability IIp. 176
Solutionsp. 177
Public Key Cryptographyp. 181
Exercisesp. 181
Okamoto-Uchiyama Cryptosystemp. 181
RSA Cryptosystemp. 182
RSA for Paranoidsp. 182
RSA - Common Modulip. 183
Networked RSAp. 183
Repeated RSA Encryptionp. 184
Modified Diffie-Hellmanp. 184
Rabin Cryptosystemp. 184
Paillier Cryptosystemp. 185
Naccache-Stern Cryptosystemp. 186
Solutionsp. 188
Digital Signaturesp. 199
Exercisesp. 199
Lazy DSSp. 199
DSS Security Hypothesisp. 199
DSS with Unprotected Parametersp. 200
Ong-Schnorr-Shamir Signaturep. 201
Batch Verification of DSS Signaturesp. 201
Ring Signaturesp. 203
Solutionsp. 205
Cryptographic Protocolsp. 211
Exercisesp. 211
Breaking the RDSA Identification Schemep. 211
A Blind Signature Protocol for a Variant of DSAp. 213
Fiat-Shamir Signature Ip. 215
Fiat-Shamir Signature IIp. 216
Authenticated Diffie-Hellman Key Agreement Protocolp. 216
Conference Key Distribution Systemp. 217
Solutionsp. 220
From Cryptography to Communication Securityp. 231
Exercisesp. 231
A Hybrid Cryptosystem Using RSA and DESp. 231
SSL/TLS Cryptographyp. 233
Secure Shell (SSH)p. 235
Attack against RC5-CBC-PADp. 236
Wired Equivalent Privacy (WEP)p. 237
Forging X.509 Certificatesp. 238
Solutionsp. 240
Referencesp. 249
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program