|
![]() |
|||
|
||||
OverviewAppropriate for all graduate-level and advanced undergraduate courses in cryptography and related mathematical fields. Modern Cryptography is an indispensable resource for every advanced student of cryptography who intends to implement strong security in real-world applications. Leading HP security expert Wenbo Mao explains why conventional crypto schemes, protocols, and systems are profoundly vulnerable, introducing both fundamental theory and real-world attacks. Next, he shows how to implement crypto systems that are truly “fit for application,” and formally demonstrate their fitness. He begins by reviewing the foundations of cryptography: probability, information theory, computational complexity, number theory, algebraic techniques, and more. He presents the “ideal” principles of authentication, comparing them with real-world implementation. Mao assesses the strength of IPSec, IKE, SSH, SSL, TLS, Kerberos, and other standards, and offers practical guidance on designing stronger crypto schemes and using formal methods to prove their security and efficiency. Finally, he presents an in-depth introduction to zero-knowledge protocols: their characteristics, development, arguments, and proofs. Mao relies on practical examples throughout, and provides all the mathematical background students will need. Full Product DetailsAuthor: Wenbo MaoPublisher: Pearson Education (US) Imprint: Prentice Hall Dimensions: Width: 17.80cm , Height: 3.60cm , Length: 23.30cm Weight: 1.170kg ISBN: 9780132887410ISBN 10: 013288741 Pages: 752 Publication Date: 07 November 2011 Audience: College/higher education , Tertiary & Higher Education Format: Paperback Publisher's Status: Out of Print Availability: Awaiting stock ![]() Table of ContentsI. INTRODUCTION. 1. Beginning with a Simple Communication Game. 2. Wrestling between Safeguard and Attack. II MATHEMATICAL FOUNDATIONS. 3. Probability and Information Theory. 4. Computational Complexity. 5. Algebraic Foundations. 6. Number Theory. III. BASIC CRYPTOGRAPHIC TECHNIQUES. 7. Encryption-Symmetric Techniques. 8. Encryption-Asymmetric Techniques. 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions. 10. Data Integrity Techniques. IV. AUTHENTICATION. 11. Authentication Protocols-Principles. 12. Authentication Protocols-The Real World. 13. Authentication Framework for Public-Key Cryptography. V. FORMAL APPROACHES TO SECURITY ESTABLISHMENT. 14. Formal and Strong Security Definitions for Public-Key Cryptosystems. 15. Provably Secure and Efficient Public-Key Cryptosystems. 16. Strong and Provable Security for Digital Signatures. 17. Formal Methods for Authentication Protocols Analysis. VI. CRYPTOGRAPHIC PROTOCOLS. 18. Zero-Knowledge Protocols. 19. Returning To Coin Flipping over Telephone . 20. Afterremark.ReviewsAuthor InformationWENBO MAO, PhD, is a Technical Contributor to the Trusted Systems Lab at Hewlett-Packard Laboratories, Bristol, UK. Mao leads HP's participation and research activities in Computer Aided Solutions to Secure Electronic Commerce Transactions (CASENET), a research project funded by the European Union. His research interests include cryptography, computer security, and formal methods. He is a member of the International Association for Cryptographic Research (IACR), the Institute of Electrical and Electronics Engineers (IEEE), and the British Computer Society (BCS). Tab Content 6Author Website:Countries AvailableAll regions |