Guide to Elliptic Curve Cryptography (Anglais) Broché – 4 octobre 2013
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.
Détails sur le produit
En savoir plus sur l'auteur
Dans ce livre(En savoir plus)
Commentaires en ligne
Meilleurs commentaires des clients
Livré avec exactitude.
Niveau maths sup.
Pour comprendre la cryptographie par courbes elliptique qui tendent à remplacer progressivement le système RSA avec des clefs beaucoup plus petites.
Commentaires client les plus utiles sur Amazon.com (beta)
As advertised, this book doesn't go into too much mathematical depth, omitting most proofs. This doesn't mean that there is no math in this book; if you don't have a decent background in algebra (no, not the stuff you learned in seventh grade), you're likely to get confused. However, if you have a little background in theoretical math and cryptography, you'll find this a very readable and easy to understand book.
The one thing that's left out of this book are intellectual property issues. Certicom owns a lot of patents on ECC, and it's not clear which ideas in this book are covered by Certicom patents. This is a minor complaint though; overall, the book is excellent. It's rare to find a book that is so exactly on target. Highly recommeneded.
Before it even gets into the text, Hankerson et al have created a model of clarity. In addition to the usual, front matter includes a list of abbreviations. If you've ever choked on the alphabet soup in other books, you'll appreciate how this makes the discussion much easier to absorb. There's also a list of the algorithms presented - what the practitioner wanted in the first place.
After an introductory chapter, the authors present finite field arithmetic in a thorough but readable way. First they present prime fields over the integers, then optimal extension fields and (most importantly) binary fields. There's nothing here for the cut&paste programmer, but dozens of algorithms help the thoughtful developer work through material that is immensely complicated in other presentations. Other goodies, like Karatsuba-Ofman fast multiplication appear here as well.
The third chapter is the book's real payload: EC techniques. I've been looking for years for a book that was so explicit in the how-to, without watering down the technical content. This is practical stuff - not just the theory of EC operations, but the techniques that make EC calculations practical for high-speed implementations.
The rest of the book - about half - discusses what to do with EC codes. That includes protocols for choosing parameters, public-key and signature algorithms, and standard kinds of attacks. It also includes hardware-level description of possible implementations, down to specific instruction sets and cache structures and different kinds of chip implementations. That leads to another set of discussions on attacks, the kind that go in through the power supply or RF emissions. Appendices provide or point to pragmatic details such as parameters to use or software support available.
The only thing that could be improved in this book is the index - it's just too brief, and lacks the thoroughness the rest of the book led me to expect. I hope you realize just how small a complaint that is. In all other ways, this book meets the highest expectations.
Highly recommended for anyone who needs to understand exactly how EC cryptography works, right down to the bit level.
1) touches on thing other books seems to ignore.
2) will not overwhelm you with the math
The bad/not so good:
1) the authors writing style is awful:
a) they don't care about the "logical" line of thought. they lead the reader somewhere then suddenly abandoned to wander what just happened and why.
b) they don't know when to start a new line. by cramming too much information in a paragraph sometimes combined with math forces the reader to go back and forth multiple times to make sure you didn't miss anything.
2) chapters don't stand on their own.
3) lack of figure to help convey the message in certain locations.