did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781107013926

Mathematics of Public Key Cryptography

by
  • ISBN13:

    9781107013926

  • ISBN10:

    1107013925

  • Format: Hardcover
  • Copyright: 2012-04-30
  • Publisher: Cambridge Univ Pr

Note: Supplemental materials are not guaranteed with Rental or Used book purchases.

Purchase Benefits

  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $49.99 Save up to $15.00
  • Rent Book $34.99
    Add to Cart Free Shipping Icon Free Shipping

    TERM
    PRICE
    DUE
    SPECIAL ORDER: 1-2 WEEKS
    *This item is part of an exclusive publisher rental program and requires an additional convenience fee. This fee will be reflected in the shopping cart.

Supplemental Materials

What is included with this book?

Summary

Public key cryptography is a major interdisciplinary subject with many real-world applications, such as digital signatures. A strong background in the mathematics underlying public key cryptography is essential for a deep understanding of the subject, and this book provides exactly that for students and researchers in mathematics, computer science and electrical engineering. Carefully written to communicate the major ideas and techniques of public key cryptography to a wide readership, this text is enlivened throughout with historical remarks and insightful perspectives on the development of the subject. Numerous examples, proofs and exercises make it suitable as a textbook for an advanced course, as well as for self-study. For more experienced researchers it serves as a convenient reference for many important topics: the Pollard algorithms, Maurer reduction, isogenies, algebraic tori, hyperelliptic curves and many more.

Author Biography

Steven D. Galbraith is a leading international authority on the mathematics of public key cryptography. He is an Associate Professor in the Department of Mathematics at the University of Auckland.

Table of Contents

Prefacep. xiii
Acknowledgementsp. xiv
Introductionp. 1
Public key cryptographyp. 2
The textbook RSA cryptosystemp. 2
Formal definition of public key cryptographyp. 4
Backgroundp. 11
Basic algorithmic number theoryp. 13
Algorithms and complexityp. 13
Integer operationsp. 21
Euclid's algorithmp. 24
Computing Legendre and Jacobi symbolsp. 27
Modular arithmeticp. 29
Chinese remainder theoremp. 31
Linear algebrap. 32
Modular exponentiationp. 33
Square roots modulo pp. 36
Polynomial arithmeticp. 38
Arithmetic in finite fieldsp. 39
Factoring polynomials over finite fieldsp. 40
Hensel liftingp. 43
Algorithms in finite fieldsp. 43
Computing orders of elements and primitive rootsp. 47
Fast evaluation of polynomials at multiple pointsp. 51
Pseudorandom generationp. 53
Summaryp. 53
Hash functions and MACsp. 54
Security properties of hash functionsp. 54
Birthday attackp. 55
Message authentication codesp. 56
Constructions of hash functionsp. 56
Number-theoretic hash functionsp. 57
Full domain hashp. 57
Random oracle modelp. 58
Algebraic Groupsp. 59
Preliminary remarks on algebraic groupsp. 61
Informal definition of an algebraic groupp. 61
Examples of algebraic groupsp. 62
Algebraic group quotientsp. 63
Algebraic groups over ringsp. 64
Varietiesp. 66
Affine algebraic setsp. 66
Projective algebraic setsp. 69
Irreducibilityp. 74
Function fieldsp. 76
Rational maps and morphismsp. 79
Dimensionp. 83
Weil restriction of scalarsp. 84
Tori, LUC and XTRp. 86
Cyclotomic subgroups of finite fieldsp. 86
Algebraic torip. 88
The group Gq,2p. 89
The group Gq,6p. 94
Further remarksp. 99
Algebraic tori over ringsp. 99
Curves and divisor class groupsp. 101
Non-singular varietiesp. 101
Weierstrass equationsp. 105
Uniformisers on curvesp. 106
Valuation at a point on a curvep. 108
Valuations and points on curvesp. 110
Divisorsp. 111
Principal divisorsp. 112
Divisor class groupp. 114
Elliptic curvesp. 116
Rational maps on curves and divisorsp. 121
Rational maps of curves and the degreep. 121
Extensions of valuationsp. 123
Maps on divisor classesp. 126
Riemann-Roch spacesp. 129
Derivations and differentialsp. 130
Genus zero curvesp. 136
Riemann-Roch theorem and Hurwitz genus formulap. 137
Elliptic curvesp. 138
Group lawp. 138
Morphisms between elliptic curvesp. 140
Isomorphisms of elliptic curvesp. 142
Automorphismsp. 143
Twistsp. 144
Isogenicsp. 146
The invariant differentialp. 153
Multiplication by n and division polynomialsp. 155
Endomorphism structurep. 156
Frobenius mapp. 158
Supersingular elliptic curvesp. 164
Alternative models for elliptic curvesp. 168
Statistical properties of elliptic curves over finite fieldsp. 175
Elliptic curves over ringsp. 177
Hyperelliptic curvesp. 178
Non-singular models for hyperelliptic curvesp. 179
Isomorphisms, automorphisms and twistsp. 186
Effective affine divisors on hyperelliptic curvesp. 188
Addition in the divisor class groupp. 196
Jacobians, Abelian varieties and isogenicsp. 204
Elements of order np. 206
Hyperelliptic curves over finite fieldsp. 206
Supersingular curvesp. 209
Exponentiation, Factoring and Discrete Logarithmsp. 213
Basic algorithms for algebraic groupsp. 215
Efficient exponentiation using signed exponentsp. 215
Multi-exponentiationp. 219
Efficient exponentiation in specific algebraic groupsp. 221
Sampling from algebraic groupsp. 231
Determining group structure and computing generators for elliptic curvesp. 235
Testing subgroup membershipp. 236
Primality testing and integer factorisation using algebraic groupsp. 238
Primality testingp. 238
Generating random primesp. 240
The p - 1 factoring methodp. 242
Elliptic curve methodp. 244
Pollard-Strassen methodp. 245
Basic discrete logarithm algorithmsp. 246
Exhaustive searchp. 247
The Pohlig-Hellman methodp. 247
Baby-step-giant-step (BSGS) methodp. 250
Lower bound on complexity of generic algorithms for the DLPp. 253
Generalised discrete logarithm problemsp. 256
Low Hamming weight DLPp. 258
Low Hamming weight product exponentsp. 260
Factoring and discrete logarithms using pseudorandom walksp. 262
Birthday paradoxp. 262
The Pollard rho methodp. 264
Distributed Pollard rhop. 273
Speeding up the rho algorithm using equivalence classesp. 276
The kangaroo methodp. 280
Distributed kangaroo algorithmp. 287
The Gaudry-Schost algorithmp. 292
Parallel collision search in other contextsp. 296
Pollard rho factoring methodp. 297
Factoring and discrete logarithms in subexponential timep. 301
Smooth integersp. 301
Factoring using random squaresp. 303
Elliptic curve method revisitedp. 310
The number field sievep. 312
Index calculus in finite fieldsp. 313
Discrete logarithms on hyperelliptic curvesp. 324
Weil descentp. 328
Discrete logarithms on elliptic curves over extension fieldsp. 329
Further resultsp. 332
Latticesp. 335
Latticesp. 337
Basic notions on latticesp. 338
The Hermite and Minkowski boundsp. 343
Computational problems in latticesp. 345
Lattice basis reductionp. 347
Lattice basis reduction in two dimensionsp. 347
LLL-reduced lattice basesp. 352
The Gram-Schmidt algorithmp. 356
The LL algorithmp. 358
Complexity of LLLp. 362
Variants of the LLL algorithmp. 365
Algorithms for the closest and shortest vector problemsp. 366
Babai's nearest plane methodp. 366
Babai's rounding techniquep. 371
The embedding techniquep. 373
Enumerating all short vectorsp. 375
Korkine-Zolotarev basesp. 379
Coppersmith's method and related applicationsp. 380
Coppersmith's method for modular univariate polynomialsp. 380
Multivariate modular polynomial equationsp. 387
Bivariate integer polynomialsp. 387
Some applications of Coppersmith's methodp. 390
Simultaneous Diophantine approximationp. 397
Approximate integer greatest common divisorsp. 398
Learning with errorsp. 400
Further applications of lattice reductionp. 402
Cryptography Related to Discrete Logarithmsp. 403
The Diffie-Hellman problem and cryptographic applicationsp. 405
The discrete logarithm assumptionp. 405
Key exchangep. 405
Textbook Elgamal encryptionp. 408
Security of textbook Elgamal encryptionp. 410
Security of Diffie-Hellman key exchangep. 414
Efficiency considerations for discrete logarithm cryptographyp. 416
The Diffie-Hellman problemp. 418
Variants of the Diffie-Hellman problemp. 418
Lower bound on the complexity of CDH for generic algorithmsp. 422
Random self-reducibility and self-correction of CDHp. 423
The den Boer and Maurer reductionsp. 426
Algorithms for static Diffie-Hellmanp. 435
Hard bits of discrete logarithmsp. 439
Bit security of Diffie-Hellmanp. 443
Digital signatures based on discrete logarithmsp. 452
Schnorr signaturesp. 452
Other public key signature schemesp. 459
Lattice attacks on signaturesp. 466
Other signature functionalitiesp. 467
Public key encryption based on discrete logarithmsp. 469
CCA secure Elgamal encryptionp. 469
Cramer-Shoup encryptionp. 474
Other encryption functionalitiesp. 478
Crytography Related to Integer Factorisationp. 483
The RSA and Rabin cryptosystemsp. 485
The textbook RSA cryptosystemp. 485
The textbook Rabin cryptosystemp. 491
Homomorphic encryptionp. 498
Algebraic attacks on textbook RSA and Rabinp. 499
Attacks on RSA parametersp. 504
Digital signatures based on RSA and Rabinp. 507
Public key encryption based on RSA and Rabinp. 511
Advanced Topics in Elliptic and Hyperelliptic Curvesp. 513
Isogenics of elliptic curvesp. 515
Isogenics and kernelsp. 515
Isogenies from j-invariantsp. 523
Isogeny graphs of elliptic curves over finite fieldsp. 529
p. 535
Constructing isogenies between elliptic curvesp. 540
Relating the discrete logarithm problem on isogenous curvesp. 543
Pairings on elliptic curvesp. 545
Weil reciprocityp. 545
The Weil pairingp. 546
The Tate-Lichtenbaum pairingp. 548
Reduction of ECDLP to finite fieldsp. 557
Computational problemsp. 559
Pairing-friendly elliptic curvesp. 561
Background mathematicsp. 564
Basic notationp. 564
Groupsp. 564
Ringsp. 565
Modulesp. 565
Polynomialsp. 566
Field extensionsp. 567
Galois theoryp. 569
Finite fieldsp. 570
Idealsp. 571
Vector spaces and linear algebrap. 572
Hermite normal formp. 575
Orders in quadratic fieldsp. 575
Binary stringsp. 576
Probability and combinatoricsp. 576
Referencep. 579
Author indexp. 603
Subject indexp. 608
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program