Introduction to Modern Cryptography: Principles and Protocols (Anglais) Relié – 31 août 2007
|Neuf à partir de||Occasion à partir de|
Il y a une édition plus récente de cet article:
Les clients ayant acheté cet article ont également acheté
Descriptions du produit
Présentation de l'éditeur
The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.
Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.
Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.
Détails sur le produit
En savoir plus sur les auteursDécouvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.
Dans ce livre(En savoir plus)
Quels sont les autres articles que les clients achètent après avoir regardé cet article?
Commentaires en ligne
Commentaires client les plus utiles sur Amazon.com (beta)
I read, consulted, and studied other books about cryptography, but 'INTRODUCTION TO MODERN CRYPTOGRAPHY' by Katz and Lindell is in my humble opinion THE BEST.
The book has a theoretical flavor, it is mathematically rigorous, but it is very readable and fluent, and presents the motivating discussions beneath each topic.
The book is fully self-contained, and gives the necessary background for each topic (for example there is a lot of basic computational number theory necessary for introducing the topic of 'public key').
The beauty of the book is in that the authors don't present a collection of protocols, with no links each other, but the flow is sequential and motivated (in contrast to books which present topics only for filling the pages).
All the theorems are proved and the treatment is rigorous, but the theory is developed from scratch, and the book is oriented to beginner students, though it presents also advanced stuff and is one of the most advanced book for beginners.
The main contents of the book are:
1) Perfect security and Shannon's theorem (information theoretic security)
2) Computational security, indistinguishability, CPA
4) One-way functions, hard-core predicate, Levin's theorem
5) Message Authentication Codes
6) Costructions of Pseudorandom objects, AES, Substitution-Permutation networks
7) Relation between Private-Key, one-way functions and pseudrandomness.
8) Number theory for the cryptography
9) Computational number theory, factorization, square roots,discrete log,diffie-hellman problems
10) Public key, goldwasser-micali, el gamal, pallier, hybrid encryption, encryption schemes based on trapdoor permutations
11)Digital Signature Schemes
I wrote only some topics of the book following my taste, but the books contains much more.
The exercises left to the end of each chapters are good, and vary from easy to hard.
The book i read was in draft form, 320 pages long, but the final edition is about 500 pages long, cause addictional sections have been added.
Indeed in the introduction of my book the authors write that their planned to add to the final edition the following:
Sub-exponential factoring algorithms
The random oracle model and efficient cryptographic constructions
Given that the final edition is 200 pages longer that my draft i think that these sections have been added.
I advice this book to everyone who wants start the study of modern cryptography from a theoretic and rigorous point of view.
After you read Katz and Lindell i suggest you to read "Foundations of Cryptography" by Goldreich, but it is too advanced and its reading requires you already read Katz and Lindell.
This was a recommended optional book for a class I took on cryptography. The class was really challenging and changed how I look at things. The class was like a super compressed version of this book. For this reason it is nice to have.
Even though the class is over I am still working through the book.
You will discover that in modern cryptography there are a number of constructs that a useful encryption system must pass. When looked at in this way a number of encryption schemes are vulnerable and you will understand why. You will discover standards are not all good; that good standards can be are flawed by poor usage; and that you do not want to write your own.
You will gain confidence in how your data is encrypted. Best of all when you read someone's paper you will know what they are saying with all those little symbols and theorems.
I've bought numerous books on Crypto - however, this is the only one I've found that gets the balance between the maths and core principles/motivations spot on! I can't recommend this book enough, IMHO it's essential reading if you're pursuing a career in Information Security.