您好,欢迎光临本网站![请登录][注册会员]  
文件名称: Introduction to Cryptography with Coding Theory(Wade Trappe)
  所属分类: 讲义
  开发工具:
  文件大小: 13mb
  下载次数: 0
  上传时间: 2019-03-04
  提 供 者: yz3156c*******
 详细说明:Introduction to Cryptography with Coding Theory(Wade Trappe) 这本书是一本关于密码学的基础,从最古老的密码学到现在的一些基础知识。 Introduction to Crypto graphy with Coding Theory If you purchase this book within the United States or Canada you should be aware that it has becn wrongfully imported without the approval of the publisher or the Author xccutivc Acquisitions Editar: George Lobell Editor-in-Chief: Sally Yagan Production Editor Racgan Keida Senior Managing Editor: Linda Miharov Berens Assistant Managing Editor: Bayani Mendoza de lcon Exccutivc Managing Editor: Kathleen SchIaparelli Manufacturing Buycr: Alan Fiscicr Marketng Manager: Halee Dinsey Marketing Assistant: Joon lon Moon Cover designer Bruce Kensela Art Director: Jayne Confe DIrector of Creative Services: Psul Belt Manager, Cover VIsual Research Permissions: Karen Sanafar Editorial Assistant: jennifer Urban Cover Image: Pillowslip Squarc Dance by Collier CampbelI LifGivorks. o Collier Campbell Lifework/CORBIS PEARSON 92006,2002 Pearson Education. Ic Pearson Prcrlticc Hall Prealc Pearson Education, Inc Upper Saddle Ri ver, N 07458 Al righs rescrved. No part of this book may be reproduced, in any form or by uny mcans, without permission in writing from the publisher Pearson Prentice Hall is a trademark of Pearson Education,Inc "MATLAB"is a registered trademark and the L-shape of the membrane bogo is a trademark of The Matrworks, Inc. used by permission Maple is a registered trademark of Maplesoft, a division of Waterloo Maple, Inc. Mathematica"is a registered trademark of Wolfram Research inc. Printed in the United Statcs of America 10987654321 IssN0-13-198199-4 Pearson Education, Lid. London carson Education Auslrmlin PTY Limited, Sydney Pearson Education Singapore, PLr., Ltd Pearson Education Norh Asia Ltd Hong Kong Pearson Education Canada, Ltd. Toronto Pearson Enducation de mexico, S.A. dc Cv Pearson Educauion-Jopan, Tokyo Pearson Education Malaysia, Pte Ltd Pearson Education, Upper Saddie River, New Jersey Contents Prefa 1 Overview of Cryptography and Its Applications 1.1 Secure Communications 1.2 Cryptographic applications 12g 2 Classical Cryptosystems 12 2.1 Shiit Ciphers 13 2.2 Aine ciphe 14 2.3 The vigenere Cipher 16 2.4 Substitution Ciphe 24 2.5 Sherlock holmes ,27 2.6 The Playfair and ADFGX Ciphers 30 2.7 Block Ciph 2.8 Binary Numbers and ASCIi 2.9 One-Time Pads 38g 2.10 Pseudo-random bit generation 41 2.11 LFSR Sequences 43 2. 12 Enigma 2.13 Exercises 2. 14 Computer Problems 3 Basic ber Theory 63 3.1 Basic notions 63 3.2 Solving aT +by=d 3.3C 70 3.4 The Chinese remainder Theorem 76 3.5 Modular Exponentiation 78 3.6 Fermat and euler 3.7 Primitive Roots 38 Inverting Matrices Mod∴…· 85 3.9 Square Roots Mod n 86 3.10 Legendre and Jacobi Symbols 88 3.11 Finite fields .93 CoNTENTS 3.12 Continued fractions 3. 13 Exercises 104 3. 14 Computer Problems III 4 The Data Encryption Standard 113 4.1 Introduction 4.2 A Simplified dES-Type algorithm 114 4.3 Differential Cryptanalysis 118 4. DES ,..123 4.5 Modes of Operation 4.6 Breaking dEs 13g 4.7 Meet-in-the-Middle Attacks 4.8 Password Security 144 4.9 Exercises 146 4.10 Computer Problems 149 5 The Advanced Encryption Standard: Rijndael 151 5.1 The Basic algorithm 152 5.2 The lay 15 5.3 Decrypt 158 5. Design Considerations 5.5 Exercises 6 The RSA algor 164 6.1 The Rsa algorithrm .164 6.2 Attacks on RSA 6.3 Primality Testing 176 6. 4 Factoring 181 6. 5 The RSA Challenge 18″ 6.6 An Application to Treaty Verification 18 6.7 The Public Key Concept 18g 6.8 Exercises .,192 6.9 Computer Problems 197 7 Discrete Logarithms 201 7.1 Discrete Logarithms 201 7.2 Computing Discrete Logs 7.3 Bit Commitmen 209 7. 4 Diffie-Hellman Key Xchange 210 7.5 The ElGamal Public Key Cryptosystem ,、212 76E 214 7.7 Computer Problems ,216 CONTENTS 8 Hash Functions 218 8. 1 Hash Functions 218 8.2 A Simple Hash Example 222 8. 3 The Secure Hash algorithm 224 8. 4 Birthday Attacks 229 8. 5 Multicollisions 232 8.6 The Random Oracle model 8.7 Using Hash Functions to Encrypt 238 8.8 Exerci 8.9 Computer Problems 242 9 Digital Signatures 244 9. 1 RSA Signatures 245 9. 2 The ElGamal Signature Scheme 246 9. 3 Hashing and Signin 249 9.4 Birthday Attacks on Signatures 250 9.5 The Digital Signature algorithm 25 9.6 Exercises 252 9.7 Computer Problem 255 10 Security Protocols 256 10.1 Intruders- in-the-Middle and Impostors 257 10.2 Key Distribution 259 10.3 Kerberos 266 10.4 Public Key Infrastructures(PKi) .270 10.5 X509 Certificates 271 10.6 Pretty Good Privacy 277 10.7 SSL and TLS 108 Secure Electronic Transaction∵… .280 283 10.9 Exercises 285 11 Digital Cash 287 11.i Digital cash 287 11.2 Exercises 294 12 Secret Sharing Schemes 296 12.1 Secret Splitting ,296 12.2 Threshold schemes 297 12.3 Exercises 303 12.4 Computer Problems 305 v CONTENTS 13 Games 307 .3 1 Flipping Coins over the Telephone 307 13.2 Poker over the Telephone ,309 13.3 Exercises 14 Zero-Knowledge Techniques 316 14. 1 The Basic Setup 316 14.2 The Feige-Fiat-Shamir Identification Scheme 319 14.3 Exercises 15 Information Theor 325 15.1 Probability Review .,326 15.2 Entropy 328 15.3 Fuhrman Codes .333 15. Perfect se 335 15.5 The Entropy of English 338 15.6 Exercises 343 16 Elliptic Curves 347 16.1 Tle Addition Law 347 16.2 Elliptic Curves Mod p ,,,352 16. 3 Factoring with Elliptic Curves 356 16.4 Elliptic Curves in Characteristic 2 360 16.5 Elliptic Curve Cryptosystems 鲁 363 16.6 Identity-Based Encryption 366 167E 16.8 Compliter Problems 374 I了 Lattice Methods 376 17.1 Lattices 376 17.2 Lattice Reduction 377 17.3 An Attacl on RSA 382 17.4 NTRU 385 17.5 Exercises 390 18 Error Correcting Codes 392 18.1 Introduct 392 18.2 Error Correcting Codes 398 18.3 Bounds on General Codes 8.4 Li 408 18.5 Hamming Codes 416 18.6 Golay Codes 18.7 Cyclic Codes 426 18.8 BCH Codes 432 CONTENTS 18.9 Reed-Solomon Codes 440 18.10 The McEliece Cryptosystem 442 18 11 Other Topics 444 18.12 Exercises 445 18.13 Computer Problems 449 19 Quantum Techniques in Cryptography 450 19.1 A Quantum Experiment 451 19.2 Quantum Key Distribution 454 19.3 Shor s Algorithm 456 19.4 Exercises 466 A Mathematica Examples 467 A 1 Getting Started with Mathematica 467 A. 2 Some Commands 469 A 3 Exampl 470 A 4 Examples for Chapter 3 4T7 A. 5 Examples for Chapter 6 480 A 6 Examples for Chapter 8 487 A 7 Examples for Chapter 12 看· 487 A 8 Examples for Chapter 13 488 A 9 Examples for Chapter 16 490 B Maple Example 495 B. 1 Getting Started with Maple B. 2 Some Commands 496 B3 Examples for Chapter 2 498 B4 Examples for Clapter 3 505 B 5 Examples for Chapter 6 509 B6 Examples for Chapter 8 .517 B7 Examples for Chapter 12 518 B 8 Examples for Chapter 13 519 B9 Examples for Chapter 16 .521 C MATLAB Examples 527 C 1 Getting Started with MATLAB 528 C2 Examples for Chapter 2 ,,,,,533 C3 Examples for Cliapter 3 .544 C 4 Examples for Chapter 6 548 C5 Examples for Chapter 8 ,.553 C 6 Examples for Chapter 12 553 C 7 Examples for Chapter 13 554 C 8 Examples for Chapter 16
(系统自动生成,下载前可以参看下载内容)

下载文件列表

相关说明

  • 本站资源为会员上传分享交流与学习,如有侵犯您的权益,请联系我们删除.
  • 本站是交换下载平台,提供交流渠道,下载内容来自于网络,除下载问题外,其它问题请自行百度
  • 本站已设置防盗链,请勿用迅雷、QQ旋风等多线程下载软件下载资源,下载后用WinRAR最新版进行解压.
  • 如果您发现内容无法下载,请稍后再次尝试;或者到消费记录里找到下载记录反馈给我们.
  • 下载后发现下载的内容跟说明不相乎,请到消费记录里找到下载记录反馈给我们,经确认后退回积分.
  • 如下载前有疑问,可以通过点击"提供者"的名字,查看对方的联系方式,联系对方咨询.
 输入关键字,在本站1000多万海量源码库中尽情搜索: