Modern Cryptography: Theory and Practice (Hewlett-Packard by Wenbo Mao

By Wenbo Mao

Applicable for all graduate-level and complicated undergraduate classes in cryptography and comparable mathematical fields. smooth Cryptography is an integral source for each complicated scholar of cryptography who intends to enforce robust safeguard in real-world functions. major HP safety professional Wenbo Mao explains why traditional crypto schemes, protocols, and platforms are profoundly weak, introducing either primary idea and real-world assaults. subsequent, he exhibits tips to enforce crypto platforms which are actually "fit for application," and officially reveal their health. He starts off by means of reviewing the principles of cryptography: likelihood, info idea, computational complexity, quantity idea, algebraic suggestions, and extra. He offers the "ideal" rules of authentication, evaluating them with real-world implementation. Mao assesses the energy of IPSec, IKE, SSH, SSL, TLS, Kerberos, and different criteria, and gives useful tips on designing superior crypto schemes and utilizing formal tips on how to turn out their safety and efficiency.Finally, he offers an in-depth creation to zero-knowledge protocols: their features, improvement, arguments, and proofs. Mao is dependent upon useful examples all through, and offers all of the mathematical history scholars will want.

Show description

Read Online or Download Modern Cryptography: Theory and Practice (Hewlett-Packard Professional Books) PDF

Best cryptography books

Introduction to Cryptography

As a result quick development of electronic verbal exchange and digital information alternate, details safety has turn into a very important factor in undefined, company, and management. smooth cryptography presents crucial suggestions for securing info and preserving info. within the first half, this ebook covers the foremost options of cryptography on an undergraduate point, from encryption and electronic signatures to cryptographic protocols.

Public Key Cryptography – PKC 2004: 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004. Proceedings

This publication constitutes the refereed lawsuits of the seventh overseas Workshop on concept and perform in Public Key Cryptography, PKC 2004, held in Singapore in March 2004. The 32 revised complete papers offered have been conscientiously reviewed and chosen from 106 submissions. All present matters in public key cryptography are addressed starting from theoretical and mathematical foundations to a extensive number of public key cryptosystems.

The Mathematics of Coding Theory, 1st Edition

This e-book makes a really obtainable creation to an important modern software of quantity thought, summary algebra, and likelihood. It comprises a variety of computational examples all through, giving newbies the chance to use, perform, and cost their realizing of key strategies. KEY themes assurance begins from scratch in treating likelihood, entropy, compression, Shannon¿s theorems, cyclic redundancy assessments, and error-correction.

Extra info for Modern Cryptography: Theory and Practice (Hewlett-Packard Professional Books)

Sample text

Fit-for-application) security properties, oftenwith security evidence formally established. message: cryptographic algorithms, protocols and systems readily contain security flaws. for The book also includes self-containedtheoretical background material that is the foundation modern cryptography. This chapter also serves a technical introduction to material and ideas that will enable us (in particular, readers who are new to the areas of cryptography, cryptographic protocols and information security) to establish some common and important concepts, definitions and agreements in the areas of study.

Many textbooks on cryptography. This book takes adifferent approach to introducing cryptography: it pays much more attention tofit-for-application aspects of cryptography. It Unfortunately, these twocrypto" real protocols frominour attempts stilldata contain security and flawsbad which explains why "textbook isonly good an fixing ideal world where are random were only discovered long after their publication. It reveals the general unfitness of "textbook crypto" for the real world by after the publication, andattacks anotheron flaw in schemes, the other protocols protocol was fourteen demonstratingnumerous such andexposed systemsafter underanother variousrealyears passed!

3behave Practical Efficiency demonstratingnumerous attacks on such schemes, protocols and systems under variousrealworld application scenarios. This book chooses to introduce a set of practicalcryptographic When we say that aand mathematical problem is efficient or isor efficiently solvable, we basically schemes, protocols systems, many of them standards de factoones, studies them closely, assert that the problem is solvable in time which can be measured by a polynomial in strong the size of explains their working principles, discusses their practicalusages, and examines their the problem.

Download PDF sample

Rated 4.27 of 5 – based on 35 votes