• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Introduction to cryptography /

پدید آورنده
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat.

موضوع
Algorithms.,Cryptography-- Mathematics.,Number theory.,Algorithms.,COMPUTERS-- Cryptography.,Cryptography-- Mathematics.,MATHEMATICS-- Combinatorics.,Number theory.,SCIENCE-- System Theory.,TECHNOLOGY & ENGINEERING-- Operations Research.

رده
QA268
.
P33
2018eb

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
1315114593
(Number (ISBN
1351628127
(Number (ISBN
1351628135
(Number (ISBN
1351628151
(Number (ISBN
9781315114590
(Number (ISBN
9781351628129
(Number (ISBN
9781351628136
(Number (ISBN
9781351628150
Erroneous ISBN
1138071536
Erroneous ISBN
9781138071537

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Introduction to cryptography /
General Material Designation
[Book]
First Statement of Responsibility
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Boca Raton, FL :
Name of Publisher, Distributor, etc.
CRC Press, Taylor & Francis Group,
Date of Publication, Distribution, etc.
[2018]
Date of Publication, Distribution, etc.
©2018

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
1 online resource (xv, 251 pages) :
Other Physical Details
illustrations

GENERAL NOTES

Text of Note
"A science publishers book."

INTERNAL BIBLIOGRAPHIES/INDEXES NOTE

Text of Note
Includes bibliographical references and index.

CONTENTS NOTE

Text of Note

Preface

Overview of Cryptography

Introduction

Goals of Cryptography

Classification of Cryptosystem

Practically Useful Cryptosystem

Cryptanalysis

Basic Algebra

Group

Ring

Field

Exercise

Number Theory

Introduction

Prime Numbers

Cardinality of Primes

Extended Euclidean Algorithm

Primality Testing

Factorization and Algorithms for it

Congruences

Quadratic Congruence

Exponentiation and Logarithm

Discrete Logarithm Problem and Algorithms for it

Exercise

Probability and Perfect Secrecy

Basic Concept of Probability

Birthday Paradox

Perfect Secrecy

Vernam One Time Pad

Random Number Generation

Pseudo-random Number Generator

Exercise

Complexity Theory

Running Time and Size of Input

Big-O Notation

Types of algorithm

Complexity Classes

Exercise

Classical Cryptosystems

Classification of Classical Cryptosystem

Block Cipher

Stream Cipher

Cryptanalysis of Cryptosystems

Exercise

Block Ciphers

Introduction

Modes of Operation

Padding

Design Considerations

Data Encryption Standard

Advanced Encryption Standard

Exercise

Hash Function

Compression and Hash Functions

Hash function for cryptography

Random Oracle Model

Cryptographic Hash Functions

Exercise

Public Key Cryptosystem

Introduction

Diffie-Hellman Key Exchange Protocol

RSA Cryptosystem

Rabin Cryptosystem

ElGamal Cryptosystem

Elliptic Curve Cryptosystem

Exercises

Digital Signature

Formal Definitions

Attack Goals for Digital Signature

Digital Signature in Practice

Some Popular Digital Signatures

Exercises

Research Directions in Cryptography

Pairing-Based Cryptography

Zero-knowledge Proof System

Authenticated Group Key Exchange

Attribute-Based Cryptography

Homomorphic Encryption

Secure Multi-party Computation

Secret Sharing

Post-Quantum Cryptography

Side-Channel Analysis

References

Index

Text of Note
Cover; Title Page; Copyright Page; Dedication; Foreword; Preface; Table of Contents; 1 Overview of Cryptography; 1.1 Introduction; 1.2 Goals of Cryptography; 1.3 Classification of Cryptosystem; 1.4 Practically Useful Cryptosystem; 1.4.1 Confusion and Diffusion; 1.5 Cryptanalysis; 1.5.1 Types of Attackers; 1.5.2 Types of Attacks; 1.5.3 Security Notions; 2 Basic Algebra; 2.1 Group; 2.2 Ring; 2.3 Field; 2.3.1 Finite Field; 2.3.2 Field Construction; 2.3.3 Field Construction using Irreducible Polynomial; 2.3.4 Galois Field GF(2n); 2.3.4.1 Integer Representation of Finite Field Elements.
Text of Note
Notation Types of algorithm Complexity Classes Exercise Classical Cryptosystems Classification of Classical Cryptosystem Block Cipher Stream Cipher Cryptanalysis of Cryptosystems Exercise Block Ciphers Introduction Modes of Operation Padding Design Considerations Data Encryption Standard Advanced Encryption Standard Exercise Hash Function Compression and Hash Functions Hash function for cryptography Random Oracle Model Cryptographic Hash Functions Exercise Public Key Cryptosystem Introduction Diffie-Hellman Key Exchange Protocol RSA Cryptosystem Rabin Cryptosystem ElGamal Cryptosystem Elliptic Curve Cryptosystem Exercises Digital Signature Formal Definitions Attack Goals for Digital.
Text of Note
2.3.5 Field Construction using Generator2.4 Exercises; 3 Number Theory; 3.1 Prime Numbers; 3.2 Cardinality of Primes; 3.3 Extended Euclidean Algorithm; 3.4 Congruences; 3.4.1 Solving Linear Congruence in Zn; 3.4.2 Chinese Remainder Theorem (CRT); 3.5 Integer Factorization Problem; 3.5.1 Trial Division Method; 3.5.2 Fermat's Method; 3.5.3 Pollard's p -- 1 Method; 3.5.4 Pollard's Rho Method; 3.5.5 Quadratic Sieve; 3.5.6 Number Field Sieve; 3.6 Primality Testing; 3.6.1 Sieve of Eratosthenes; 3.6.2 Divisibility Algorithm; 3.6.3 AKS Algorithm; 3.6.4 Fermat Test; 3.6.5 Miller-Rabin Algorithm.
Text of Note
3.7 Quadratic Congruence3.7.1 Quadratic Residue or Non-Residue; 3.7.2 Legendre Symbol and Jacobi Symbol; 3.8 Exponentiation and Logarithm; 3.8.1 Square and Multiply Method; 3.9 Discrete Logarithm Problem; 3.9.1 Shank's Baby-Step Giant-Step Algorithm; 3.9.2 Pollard's Rho Algorithm; 3.9.3 Pohlig-Hellman Algorithm; 3.9.4 Index Calculus Algorithm; 3.10 Exercises; 4 Probability and Perfect Secrecy; 4.1 Basic Concept of Probability; 4.2 Birthday Paradox; 4.3 Perfect Secrecy; 4.4 Vernam One-Time Pad; 4.5 Random Number Generation; 4.6 Pseudo-random Number Generator; 4.7 Exercises; 5 Complexity Theory.
Text of Note
5.1 Running Time and Size of Input5.2 Big-O Notation; 5.2.1 Big-O and Growth Rate; 5.2.2 Properties of Order Notation; 5.3 Types of Algorithm; 5.4 Complexity Classes; 5.5 Exercises; 6 Classical Cryptosystems; 6.1 Classification of Classical Cryptosystem; 6.2 Block Cipher; 6.2.1 Substitution Cipher; 6.2.1.1 Shift Cipher; 6.2.1.2 Affine Cipher; 6.2.1.3 Substitution Cipher; 6.2.1.4 Vigenere Cipher; 6.2.1.5 Hill Cipher; 6.2.2 Transposition Cipher; 6.2.2.1 Scytale; 6.2.2.2 The Rail Fence Cipher; 6.3 Stream Cipher; 6.3.1 Synchronous Stream Cipher.
Text of Note
6.3.1.1 Vigenere Cipher as Synchronous Stream Cipher6.3.2 Linear Feedback Shift Register (LFSR); 6.3.3 Non-Synchronous Stream Cipher; 6.3.3.1 Autokey Cipher; 6.4 Cryptanalysis of Cryptosystems; 6.4.1 Frequency Analysis; 6.4.2 Cryptanalysis of Affine Cipher; 6.4.3 Cryptanalysis of Substitution Cipher; 6.4.4 Cryptanalysis of Vigenere Cipher; 6.4.5 Cryptanalysis of Hill Cipher; 6.4.6 Cryptanalysis of LFSR Stream Cipher; 6.5 Exercises; 7 Block Ciphers; 7.1 Introduction; 7.1.1 Notations; 7.2 Modes of Operation; 7.2.1 Electronic Code Book (ECB); 7.2.1.1 ECB Properties.
0
0
0
8
8
8
8

SUMMARY OR ABSTRACT

Text of Note
"Electronic communication and financial transactions have assumed massive proportions today. But they comprise high risks too. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT.?This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. Students who have elementary knowledge of mathematics, will be introduced to mathematical notions relevant to cryptography, and the design and analysis of the cryptographic schemes. More advanced students who have already a background of algebra, number theory, probability and algorithms; will be able to review the applications of secure systems and will be introduced to cryptographic primitives and current research, besides being exposed to scope of future research addressing the open problems in related area. This book gives more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research."--Provided by publisher.

ACQUISITION INFORMATION NOTE

Source for Acquisition/Subscription Address
Ingram Content Group
Stock Number
9781351628136

OTHER EDITION IN ANOTHER MEDIUM

Title
Introduction to cryptography.
International Standard Book Number
9781138071537

TOPICAL NAME USED AS SUBJECT

Algorithms.
Cryptography-- Mathematics.
Number theory.
Algorithms.
COMPUTERS-- Cryptography.
Cryptography-- Mathematics.
MATHEMATICS-- Combinatorics.
Number theory.
SCIENCE-- System Theory.
TECHNOLOGY & ENGINEERING-- Operations Research.

(SUBJECT CATEGORY (Provisional

COM-- 083000
MAT-- 036000
PBV
SCI-- 064000
TEC-- 029000

DEWEY DECIMAL CLASSIFICATION

Number
003/
.
54
Edition
23

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA268
Book number
.
P33
2018eb

PERSONAL NAME - PRIMARY RESPONSIBILITY

Padhye, Sahadeo

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Sahu, Rajeev A.
Saraswat, Vishal

ORIGINATING SOURCE

Date of Transaction
20200822160805.0
Cataloguing Rules (Descriptive Conventions))
pn

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival