文件名称:
Introduction to Cryptography with Coding Theory(Wade Trappe)
开发工具:
文件大小: 13mb
下载次数: 0
上传时间: 2019-03-04
详细说明:Introduction to Cryptography with Coding Theory(Wade Trappe)
这本书是一本关于密码学的基础,从最古老的密码学到现在的一些基础知识。
Introduction to Crypto graphy
with Coding Theory
If you purchase this book within the United States or Canada you should be aware that it has becn
wrongfully imported without the approval of the publisher or the Author
xccutivc Acquisitions Editar: George Lobell
Editor-in-Chief: Sally Yagan
Production Editor Racgan Keida
Senior Managing Editor: Linda Miharov Berens
Assistant Managing Editor: Bayani Mendoza de lcon
Exccutivc Managing Editor: Kathleen SchIaparelli
Manufacturing Buycr: Alan Fiscicr
Marketng Manager: Halee Dinsey
Marketing Assistant: Joon lon Moon
Cover designer Bruce Kensela
Art Director: Jayne Confe
DIrector of Creative Services: Psul Belt
Manager, Cover VIsual Research Permissions: Karen Sanafar
Editorial Assistant: jennifer Urban
Cover Image: Pillowslip Squarc Dance by Collier CampbelI LifGivorks. o Collier Campbell
Lifework/CORBIS
PEARSON 92006,2002 Pearson Education. Ic
Pearson Prcrlticc Hall
Prealc
Pearson Education, Inc
Upper Saddle Ri ver, N 07458
Al righs rescrved. No part of this book may be reproduced, in any form or by uny mcans, without
permission in writing from the publisher
Pearson Prentice Hall is a trademark of Pearson Education,Inc
"MATLAB"is a registered trademark and the L-shape of the membrane bogo is a trademark of The
Matrworks, Inc. used by permission
Maple is a registered trademark of Maplesoft, a division of Waterloo Maple, Inc.
Mathematica"is a registered trademark of Wolfram Research inc.
Printed in the United Statcs of America
10987654321
IssN0-13-198199-4
Pearson Education, Lid. London
carson Education Auslrmlin PTY Limited, Sydney
Pearson Education Singapore, PLr., Ltd
Pearson Education Norh Asia Ltd Hong Kong
Pearson Education Canada, Ltd. Toronto
Pearson Enducation de mexico, S.A. dc Cv
Pearson Educauion-Jopan, Tokyo
Pearson Education Malaysia, Pte Ltd
Pearson Education, Upper Saddie River, New Jersey
Contents
Prefa
1 Overview of Cryptography and Its Applications
1.1 Secure Communications
1.2 Cryptographic applications
12g
2 Classical Cryptosystems
12
2.1 Shiit Ciphers
13
2.2 Aine ciphe
14
2.3 The vigenere Cipher
16
2.4 Substitution Ciphe
24
2.5 Sherlock holmes
,27
2.6 The Playfair and ADFGX Ciphers
30
2.7 Block Ciph
2.8 Binary Numbers and ASCIi
2.9 One-Time Pads
38g
2.10 Pseudo-random bit generation
41
2.11 LFSR Sequences
43
2. 12 Enigma
2.13 Exercises
2. 14 Computer Problems
3 Basic
ber Theory
63
3.1 Basic notions
63
3.2 Solving aT +by=d
3.3C
70
3.4 The Chinese remainder Theorem
76
3.5 Modular Exponentiation
78
3.6 Fermat and euler
3.7 Primitive Roots
38 Inverting Matrices Mod∴…·
85
3.9 Square Roots Mod n
86
3.10 Legendre and Jacobi Symbols
88
3.11 Finite fields
.93
CoNTENTS
3.12 Continued fractions
3. 13 Exercises
104
3. 14 Computer Problems
III
4 The Data Encryption Standard
113
4.1 Introduction
4.2 A Simplified dES-Type algorithm
114
4.3 Differential Cryptanalysis
118
4. DES
,..123
4.5 Modes of Operation
4.6 Breaking dEs
13g
4.7 Meet-in-the-Middle Attacks
4.8 Password Security
144
4.9 Exercises
146
4.10 Computer Problems
149
5 The Advanced Encryption Standard: Rijndael
151
5.1 The Basic algorithm
152
5.2 The lay
15
5.3 Decrypt
158
5. Design Considerations
5.5 Exercises
6 The RSA algor
164
6.1 The Rsa algorithrm
.164
6.2 Attacks on RSA
6.3 Primality Testing
176
6. 4 Factoring
181
6. 5 The RSA Challenge
18″
6.6 An Application to Treaty Verification
18
6.7 The Public Key Concept
18g
6.8 Exercises
.,192
6.9 Computer Problems
197
7 Discrete Logarithms
201
7.1 Discrete Logarithms
201
7.2 Computing Discrete Logs
7.3 Bit Commitmen
209
7. 4 Diffie-Hellman Key Xchange
210
7.5 The ElGamal Public Key Cryptosystem
,、212
76E
214
7.7 Computer Problems
,216
CONTENTS
8 Hash Functions
218
8. 1 Hash Functions
218
8.2 A Simple Hash Example
222
8. 3 The Secure Hash algorithm
224
8. 4 Birthday Attacks
229
8. 5 Multicollisions
232
8.6 The Random Oracle model
8.7 Using Hash Functions to Encrypt
238
8.8 Exerci
8.9 Computer Problems
242
9 Digital Signatures
244
9. 1 RSA Signatures
245
9. 2 The ElGamal Signature Scheme
246
9. 3 Hashing and Signin
249
9.4 Birthday Attacks on Signatures
250
9.5 The Digital Signature algorithm
25
9.6 Exercises
252
9.7 Computer Problem
255
10 Security Protocols
256
10.1 Intruders- in-the-Middle and Impostors
257
10.2 Key Distribution
259
10.3 Kerberos
266
10.4 Public Key Infrastructures(PKi)
.270
10.5 X509 Certificates
271
10.6 Pretty Good Privacy
277
10.7 SSL and TLS
108 Secure Electronic Transaction∵…
.280
283
10.9 Exercises
285
11 Digital Cash
287
11.i Digital cash
287
11.2 Exercises
294
12 Secret Sharing Schemes
296
12.1 Secret Splitting
,296
12.2 Threshold schemes
297
12.3 Exercises
303
12.4 Computer Problems
305
v
CONTENTS
13 Games
307
.3 1 Flipping Coins over the Telephone
307
13.2 Poker over the Telephone
,309
13.3 Exercises
14 Zero-Knowledge Techniques
316
14. 1 The Basic Setup
316
14.2 The Feige-Fiat-Shamir Identification Scheme
319
14.3 Exercises
15 Information Theor
325
15.1 Probability Review
.,326
15.2 Entropy
328
15.3 Fuhrman Codes
.333
15. Perfect se
335
15.5 The Entropy of English
338
15.6 Exercises
343
16 Elliptic Curves
347
16.1 Tle Addition Law
347
16.2 Elliptic Curves Mod p
,,,352
16. 3 Factoring with Elliptic Curves
356
16.4 Elliptic Curves in Characteristic 2
360
16.5 Elliptic Curve Cryptosystems
鲁
363
16.6 Identity-Based Encryption
366
167E
16.8 Compliter Problems
374
I了 Lattice Methods
376
17.1 Lattices
376
17.2 Lattice Reduction
377
17.3 An Attacl on RSA
382
17.4 NTRU
385
17.5 Exercises
390
18 Error Correcting Codes
392
18.1 Introduct
392
18.2 Error Correcting Codes
398
18.3 Bounds on General Codes
8.4 Li
408
18.5 Hamming Codes
416
18.6 Golay Codes
18.7 Cyclic Codes
426
18.8 BCH Codes
432
CONTENTS
18.9 Reed-Solomon Codes
440
18.10 The McEliece Cryptosystem
442
18 11 Other Topics
444
18.12 Exercises
445
18.13 Computer Problems
449
19 Quantum Techniques in Cryptography
450
19.1 A Quantum Experiment
451
19.2 Quantum Key Distribution
454
19.3 Shor s Algorithm
456
19.4 Exercises
466
A Mathematica Examples
467
A 1 Getting Started with Mathematica
467
A. 2 Some Commands
469
A 3 Exampl
470
A 4 Examples for Chapter 3
4T7
A. 5 Examples for Chapter 6
480
A 6 Examples for Chapter 8
487
A 7 Examples for Chapter 12
看·
487
A 8 Examples for Chapter 13
488
A 9 Examples for Chapter 16
490
B Maple Example
495
B. 1 Getting Started with Maple
B. 2 Some Commands
496
B3 Examples for Chapter 2
498
B4 Examples for Clapter 3
505
B 5 Examples for Chapter 6
509
B6 Examples for Chapter 8
.517
B7 Examples for Chapter 12
518
B 8 Examples for Chapter 13
519
B9 Examples for Chapter 16
.521
C MATLAB Examples
527
C 1 Getting Started with MATLAB
528
C2 Examples for Chapter 2
,,,,,533
C3 Examples for Cliapter 3
.544
C 4 Examples for Chapter 6
548
C5 Examples for Chapter 8
,.553
C 6 Examples for Chapter 12
553
C 7 Examples for Chapter 13
554
C 8 Examples for Chapter 16
(系统自动生成,下载前可以参看下载内容)
下载文件列表
相关说明
- 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
- 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度。
- 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
- 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
- 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
- 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.