Public key cryptography : applications and attacks /

This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used i...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Batten, Lynn Margaret
Μορφή: Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Hoboken, N.J. : John Wiley & Sons, [2013]
Σειρά:IEEE Press series on information & communication networks security.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06387nam a2200769 4500
001 ocn828735989
003 OCoLC
005 20170124070651.5
006 m o d
007 cr cn||||||||a
008 120820s2013 njuad ob 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCO  |d OCLCQ  |d YDXCP  |d DG1  |d UKMGB  |d IEEEE  |d NOC  |d OCLCO  |d OCLCF  |d N$T  |d CDX  |d COO  |d IDEBK  |d EBLCP  |d UKDOC  |d DEBSZ  |d OCLCQ  |d LOA  |d OCLCQ  |d GrThAP 
016 7 |a 016182125  |2 Uk 
019 |a 824697371  |a 827623334  |a 960200499  |a 961570920  |a 962709374 
020 |a 9781118482315  |q (electronic bk.) 
020 |a 111848231X  |q (electronic bk.) 
020 |a 9781118482261  |q (electronic bk.) 
020 |a 1118482263  |q (electronic bk.) 
020 |a 9781283960526  |q (MyiLibrary) 
020 |a 1283960524  |q (MyiLibrary) 
020 |z 9781118317129  |q (cloth) 
020 |z 1118317122 
024 3 |a 9781118482261 
029 1 |a AU@  |b 000050824139 
029 1 |a CHBIS  |b 010026750 
029 1 |a CHVBK  |b 306234947 
029 1 |a DEBBG  |b BV041906334 
029 1 |a DEBBG  |b BV043395533 
029 1 |a DEBSZ  |b 400042762 
029 1 |a DEBSZ  |b 431299145 
029 1 |a DEBSZ  |b 449341380 
029 1 |a NLGGC  |b 35670405X 
029 1 |a NZ1  |b 15340409 
035 |a (OCoLC)828735989  |z (OCoLC)824697371  |z (OCoLC)827623334  |z (OCoLC)960200499  |z (OCoLC)961570920  |z (OCoLC)962709374 
050 4 |a TK5102.94  |b .B38 2013eb 
072 7 |a COM  |x 083000  |2 bisacsh 
082 0 4 |a 005.8/2  |2 23 
049 |a MAIN 
100 1 |a Batten, Lynn Margaret. 
245 1 0 |a Public key cryptography :  |b applications and attacks /  |c Lynn Margaret Batten. 
264 1 |a Hoboken, N.J. :  |b John Wiley & Sons,  |c [2013] 
264 4 |c ©2013 
300 |a 1 online resource (xvii, 201 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a IEEE Press series on information and communication networks security 
504 |a Includes bibliographical references and index. 
505 0 |a PUBLIC KEY CRYPTOGRAPHY: Applications and Attacks; Contents; Preface; Acknowledgments; List of Figures; 1 INTRODUCTION; 1.1 The Meaning of the Word Cryptography; 1.2 Symmetric Key Cryptography; 1.2.1 Impact of Technology; 1.2.2 Confusion and Diffusion; 1.2.3 DES and AES; 1.3 Public Key (Asymmetric) Cryptography; 1.3.1 Diffie-Hellman Key Exchange; 1.3.2 RSA; 1.3.3 ElGamal; 1.4 Key Establishment; 1.5 Cryptography-More than just Hiding Secrets; 1.5.1 Digital Signatures; 1.5.2 Authentication; 1.5.3 Nonrepudiation; 1.6 Standards; 1.7 Attacks; 2 CONGRUENCE EQUATIONS; 2.1 Congruence Arithmetic. 
505 8 |a 2.1.1 Computer Examples2.1.2 Problems; 2.2 The Euclidean Algorithm-Finding Inverses; 2.2.1 Computer Examples; 2.2.2 Problems; 2.3 Discrete Logarithms and Diffie-Hellman Key Exchange; 2.3.1 Computer Examples; 2.3.2 Problems; 2.4 Attacking the Discrete Logarithm; 2.4.1 Computer Examples; 2.4.2 Problems; 3 THE ELGAMAL SCHEME; 3.1 Primitive Roots; 3.1.1 Computer Examples; 3.1.2 Problems; 3.2 The ElGamal Scheme; 3.2.1 Computer Examples; 3.2.2 Problems; 3.3 Security of the ElGamal Scheme; 3.3.1 Computer Examples; 3.3.2 Problems; 4 THE RSA SCHEME; 4.1 Euler's Theorem; 4.1.1 Computer Examples. 
505 8 |a 4.1.2 Problems4.2 The RSA Algorithm; 4.2.1 The RSA Parameters; 4.2.2 Computer Examples; 4.2.3 Problems; 4.3 RSA Security; 4.3.1 Computer Examples; 4.3.2 Problems; 4.4 Implementing RSA; 4.4.1 Computer Examples; 4.4.2 Problems; 5 ELLIPTIC CURVE CRYPTOGRAPHY; 5.1 Elliptic Curves and Elliptic Curve Groups; 5.1.1 What is an Elliptic Curve?; 5.1.2 Operations on Points; 5.1.3 Adding a Point to Its Negative; 5.1.4 Adding a Point to Itself; 5.1.5 Computer Examples; 5.1.6 Problems; 5.2 Elliptic Curve Cryptography; 5.2.1 Elliptic Curve Groups and the Discrete Logarithm Problem. 
505 8 |a 5.2.2 An Elliptic Curve ElGamal System5.2.3 Elliptic Curve Key Exchange (ECKE); 5.2.4 Computer Examples; 5.2.5 Problems; 5.3 The Elliptic Curve Factoring Scheme; 5.3.1 Computer Examples; 5.3.2 Problems; 6 DIGITAL SIGNATURES; 6.1 Hash Functions; 6.1.1 SHA-1; 6.1.2 MD5; 6.1.3 The Search for New Hash Functions; 6.1.4 Computer Examples; 6.1.5 Problems; 6.2 Digital Signature Schemes; 6.2.1 Direct Digital Signature Schemes; 6.2.2 Using RSA for Signing; 6.2.3 Using ElGamal for Signing; 6.2.4 Arbitrated Digital Signature Schemes; 6.2.5 The Digital Signature Standard; 6.2.6 Computer Examples. 
505 8 |a 6.2.7 Problems6.3 Attacks on Digital Signatures; 6.3.1 The Birthday Attack; 6.3.2 Intruder-in-the-Middle Attack; 6.3.3 Intruder-in-the-Middle and Diffie-Hellman; 6.3.4 An Attack on RSA Signatures: What if Eve Uses Alice's Signature?; 6.3.5 Protecting ElGamal with Signatures; 6.3.6 Oscar Tries to Trick Bob; 6.3.7 Oscar Captures a Message with a Signed Version; 6.3.8 Alice Reuses a Random Number; 6.3.9 Computer Examples; 6.3.10 Problems; 7 PRIMALITY TESTING; 7.1 Fermat's Approach and Wilson's Theorem; 7.1.1 Computer Examples; 7.1.2 Problems; 7.2 The Miller-Selfridge-Rabin Primality Test. 
520 |a This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them. Illustrated with many examples, the book provides a solid foundation for professionals in government, cloud service providers, and large enterprises using public-key systems to secure their data. It is also useful for those taking the CISSP exam (Certified Information Systems Secur. 
650 0 |a Public key cryptography. 
650 0 |a Cryptography  |x Mathematics. 
650 4 |a Cryptography  |x History. 
650 4 |a Cryptography  |x Mathematics. 
650 4 |a Public key cryptography. 
650 7 |a COMPUTERS  |x Security  |x Cryptography.  |2 bisacsh 
650 7 |a Cryptography  |x Mathematics.  |2 fast  |0 (OCoLC)fst00884558 
650 7 |a Public key cryptography.  |2 fast  |0 (OCoLC)fst01082562 
655 4 |a Electronic books. 
776 0 8 |i Print version:  |a Batten, Lynn Margaret.  |t Public key cryptography.  |d Hoboken, N.J. : John Wiley & Sons, ©2013  |w (DLC) 2012025411 
830 0 |a IEEE Press series on information & communication networks security. 
856 4 0 |u https://doi.org/10.1002/9781118482261  |z Full Text via HEAL-Link 
994 |a 92  |b DG1