Handbook of Applied Cryptography
Alfred J. Menezes ; Paul C. van Oorschot ; Scott A. Vanstone ; Kenneth H. Rosen
 Vår pris
 2363,
(Innbundet)
Fri frakt!
Leveringstid:
Sendes innen 21 dager
(Innbundet)
Fri frakt!
Leveringstid:
Sendes innen 21 dager
 FAKTA

Utgitt:
1996
Forlag: CRC Press Inc
Innbinding: Innbundet
Språk: Engelsk
Sider: 810
ISBN: 9780849385230
Format: 25 x 18 cm
 KATEGORIER:
 VURDERING

Gi vurdering
Les vurderinger
«
"…very well suited for the reader who wants an encyclopedic description of the state of the art of applied modern cryptography."
»
Mathematical Reviews, Issue 99g
"[This book] is an incredible achievement. … [T]he handbook is complete. If I want to check what problems there were with a proposed system, determine how the variations on a particular algorithm developed, see what research preceded and followed an idea, I go to the Handbook. The Handbook has accurate, clear, and correct information. It is wonderful. … If I were limited to only one cryptography text on my shelves, it would be the Handbook of Applied Cryptography."
 Bulletin of the AMS
Overview of Cryptography
Introduction
Information security and cryptography
Background on functions
Functions(11, oneway, trapdoor oneway)
Permutations
Involutions
Basic terminology and concepts
Symmetrickey encryption
Overview of block ciphers and stream ciphers
Substitution ciphers and transposition ciphers
Composition of ciphers
Stream ciphers
The key space
Digital signatures
Authentication and identification
Identification
Data origin authentication
Publickey cryptography
Publickey encryption
The necessity of authentication in publickey systems
Digital signatures from reversible publickey encryption
Symmetrickey versus publickey cryptography
Hash functions
Protocols and mechanisms
Key establishment, management, and certification
Key management through symmetrickey techniques
Key management through publickey techniques
Trusted third parties and publickey certificates
Pseudorandom numbers and sequences
Classes of attacks and security models
Attacks on encryption schemes
Attacks on protocols
Models for evaluating security
Perspective for computational security
Notes and further references
Mathematical Background
Probability theory
Basic definitions
Conditional probability
Random variables
Binomial distribution
Birthday attacks
Random mappings
Information theory
Entropy
Mutual information
Complexity theory
Basic definitions
Asymptotic notation
Complexity classes
Randomized algorithms
Number theory
The integers
Algorithms in Z
The integers modulo n
Algorithms in Zn
The Legendre and Jacobi symbols
Blum integers
Abstract algebra
Groups
Rings
Fields
Polynomial rings
Vector spaces
Finite fields
Basic properties
The Euclidean algorithm for polynomials
Arithmetic of polynomials
Notes and further references
NumberTheoretic Reference Problems
Introduction and overview
The integer factorization problem
Trial division
Pollard's rho factoring algorithm
Pollard's p  1 factoring algorithm
Elliptic curve factoring
Random square factoring methods
Quadratic sieve factoring
Number field sieve factoring
The RSA problem
The quadratic residuosity problem
Computing square roots in Zn
Case (i): n prime
Case (ii): n composite
The discrete logarithm problem
Exhaustive search
Babystep giantstep algorithm
Pollard's rho algorithm for logarithms
PohligHellman algorithm
Indexcalculus algorithm
Discrete logarithm problem in subgroups of Z*p
The DiffieHellman problem
Composite moduli
Computing individual bits
The discrete logarithm problem in Z*p  individual bits
The RSA problem  individual bits
The Rabin problem  individual bits
The subset sum problem
The L3Iattice basis reduction algorithm
Solving subset sum problems of low density
Simultaneous diophantine approximation
Factoring polynomials over finite fields
Squarefree factorization
Beriekamp's Qmatrix algorithm
Notes and further references
PublicKey Parameters
Introduction
Generating large prime numbers naively
Distribution of prime numbers
Probabilistic primality tests
Fermat's test
SolovayStrassen test
MillerRabin test
Comparison: Fermat, SolovayStrassen and MillerRabin
(True) Primality tests
Testing Mersenne numbers
Primality testing using the factorization of n  1
Jacobi sum test
Tests using elliptic curves
Prime number generation
Random search for probable primes
Strong primes
NIST method for generating DSA primes
Constructive techniques for provable primes
Irreducible polynomials over Zp
Irreducible polynomials
Irreducible trinomials
Primitive polynomials
Generators and elements of high order
Selecting a prime p and generator of Z*p
Notes and further references
Pseudorandom Bits and Sequences
Introduction
Classification and framework
Random bit generation
Pseudorandom bit generation
ANSI X9.17
FIPS 186
Statistical tests
The normal and chisquare distributions
Hypothesis testing
Golomb's randomness postulates
Five basic tests
Maurer's universal statistical test
Cryptographically secure pseudorandom bit generation
RSA pseudorandom bit generator
BlumBlumShub pseudorandom bit generator
Notes and further references
Stream Ciphers
Introduction
Classification
Feedback shift registers
Linear feedback shift registers
Linear complexity
BerlekampMassey algorithm
Nonlinear feedback shift registers
Stream ciphers based on LFSRs
Nonlinear combination generators
Nonlinear filter generators
Clockcontrolled generators
Other stream ciphers
SEAL
Notes and further references
Block Ciphers
Introduction and overview
Background and general concepts
Introduction to block ciphers
Modes of operation
Exhaustive key search and multiple encryption
Classical ciphers and historical development
Transposition ciphers
Substitution ciphers
Polyalphabetic substitutions and Vigenere ciphers
Polyalphabetic cipher machines and rotors (historical)
Cryptanalysis of classical ciphers
DES
Product ciphers and Feistel ciphers
DES algorithm
DES properties and strength
FEAL
IDEA
SAFER, RC5, and other block ciphers
SAFER
RC5
Other block ciphers
Notes and further references
PublicKey Encryption
Introduction
Basic principles
RSA publickey encryption
Description
Security of RSA
RSA encryption in practice
Rabin publickey encryption
ElGamal publickey encryption
Basic ElGamal encryption
Generalized ElGamal encryption
McEliece publickey encryption
Knapsack publickey encryption
MerkleHellman knapsack encryption
ChorRivest knapsack encryption
Probabilistic publickey encryption
GoldwasserMicali probabilistic encryption
BlumGoldwasser probabilistic encryption
Plaintextaware encryption
Notes and further references
Hash Functions and Data Integrity
Introduction
Classification and framework
General classification
Basic properties and definitions
Hash properties required for specific applications
Oneway functions and compression functions
Relationships between properties
Other hash function properties and applications
Basic constructions and general results
General model for iterated hash functions
General constructions and extensions
Formatting and initialization details
Security objectives and basic attacks
Bitsizes required for practical security
Unkeyed hash functions (MDCs)
Hash functions based on block ciphers
Customized hash functions based on MD4
Hash functions based on modular arithmetic
Keyed hash functions (MACS)
MACs based on block ciphers
Constructing MACs from MDCs
Customized MACs
MACs for stream ciphers
Data integrity and message authentication
Background and definitions
Nonmalicious vs. malicious threats to data integrity
Data integrity using a MAC alone
Data integrity using an MDC and an authentic channel
Data integrity combined with encryption
Advanced attacks on hash functions
Birthday attacks
Pseudocollisions and compression function attacks
Chaining attacks
Attacks based on properties of underlying cipher
Notes and further references
Identification and Entity Authentication
Introduction
Identification objectives and applications
Properties of identification protocols
Passwords (weak authentication)
Fixed password schemes: techniques
Fixed password schemes: attacks
Case study  UNIX passwords
PINs and passkeys
Onetime passwords (towards strong authentication)
Challengeresponse identification (strong authentication)
Background on timevariant parameters
Challengeresponse by symmetrickey techniques
Challengeresponse by publickey techniques
Customized and zeroknowledge identification protocols
Overview of zeroknowledge concepts
FeigeFiatShamir identification protocol
GQ identification protocol
Schnorr identification protocol
Comparison: FiatShamir, GQ, and Schnorr
Attacks on identification protocols
Notes and further references
Digital Signatures
Introduction
A framework for digital signature mechanisms
Basic definitions
Digital signatures schemes with appendix
Digital signature schemes with message recovery
Types of attacks on signature schemes
RSA and related signature schemes
The RSA signature scheme
Possible attacks on RSA signatures
RSA signatures in practice
The Rabin publickey signature scheme
ISO/lEC 9796 formatting
PKCS #1 formatting
FiatShamir signature schemes
FeigeFiatShamir signature scheme
GQ signature scheme
The DSA and related signature schemes
The Digital Signature Algorithm (DSA)
The ElGamal signature scheme
The generalized ElGamal signature scheme
The Schnorr signature scheme
The ElGamal signature scheme with message recovery
Onetime digital signatures
The Rabin onetime signature scheme
The Merkle onetime signature scheme
Authentication trees and onetime signatures
The GMR onetime signature scheme
Other signature schemes
Arbitrated digital signatures
ESIGN
Signatures with additional functionality
Blind signature schemes
Undeniable signature schemes
Failstop signature schemes
Notes and further references
Key Establishment Protocols
Introduction
Classification and framework
General classification and fundamental concepts
Objectives and properties
Assumptions and adversaries in key establishment protocols
Key transport based on symmetric encryption
Symmetric key transport and derivation without a server
Kerberos and related serverbased protocols
Key agreement based on symmetric techniques
Key transport based on publickey encryption
Key transport using PK encryption without signatures
Protocols combining PK encryption and signatures
Hybrid key transport protocols using PK encryption
Key agreement based on asymmetric techniques
DiffieHellman and related key agreement protocols
Implicitlycertified public keys
DiffieHellman protocols using implicitly certified keys
Secret sharing
Simple shared control schemes
Threshold schemes
Generalized secret sharing
Conference keying
Analysis of key establishment protocols
Attack strategies and classic protocol flaws
Analysis objectives and methods
Notes and further references
Key Management Techniques
Introduction
Background and basic concepts
Classifying keys by algorithm type and intended use
Key management objectives, threats, and policy
Simple key establishment models
Roles of third parties
Tradeoffs among key establishment protocols
Techniques for distributing confidential keys
Key layering and cryptoperiods
Key translation centers and symmetrickey certificates
Techniques for distributing public keys
Authentication trees
Publickey certificates
Identitybased systems
Implicitly certified public keys
Comparison of techniques for distributing public keys
Techniques for controlling key usage
Key separation and constraints on key usage
Techniques for controlling use of symmetric keys
Key management involving multiple domains
Trust between two domains
Trust models involving multiple certification authorities
Certificate distribution and revocation
Key life cycle issues
Lifetime protection requirements
Key management life cycle
Advanced trusted third party services
Trusted timestamping service
Nonrepudiation and notarization of digital signatures
Key escrow
Notes and further references
Efficient Implementation
Introduction
Multipleprecision integer arithmetic
Radix representation
Addition and subtraction
Multiplication
Squaring
Division
Multipleprecision modular arithmetic
Classical modular multiplication
Montgomery reduction
Barrett reduction
Reduction methods for moduli of special form
Greatest common divisor algorithms
Binary gcd algorithm
Lehmer's gcd algorithm
Binary extended gcd algorithm
Chinese remainder theorem for integers
Residue number systems
Garner's algorithm
Exponentiation
Basic techniques for exponentiation
Fixedexponent exponentiation algorithms
Fixedbase exponentiation algorithms
Exponent recoding
Signeddigit representation
Stringreplacement representation
Notes and further references
Patents and Standards
Introduction
Patents on cryptographic techniques
Five fundamental patents
Ten prominent patents
Ten selected patents
Ordering and acquiring patents
Cryptographic standards
International standards  cryptographic techniques
Banking security standards (ANSI, ISO)
International security architectures and frameworks
U.S. government standards (FIPS)
Industry standards and RFCs
De facto standards
Ordering and acquiring standards
Notes and further references
A. Bibliography of Papers from Selected Cryptographic Forums
Asiacrypt/Auscrypt Proceedings
Crypto Proceedings
Eurocrypt Proceedings
Fast Software Encryption Proceedings
Journal of Cryptology papers
References
Index