Vtome.ru - электронная библиотека

Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, 2nd Edition

  • Добавил: literator
  • Дата: 17-05-2024, 14:44
  • Комментариев: 0
Название: Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms, 2nd Edition
Автор: Christof Paar, Jan Pelzl, Tim Güneysu
Издательство: Springer
Год: 2024
Страниц: 555
Язык: английский
Формат: pdf (true)
Размер: 11.4 MB

Understanding and employing cryptography has become central for securing virtually any digital application, whether user app, cloud service, or even medical implant.

Heavily revised and updated, the long-awaited second edition of Understanding Cryptography follows the unique approach of making modern cryptography accessible to a broad audience, requiring only a minimum of prior knowledge. After introducing basic cryptography concepts, this seminal textbook covers nearly all symmetric, asymmetric, and post-quantum cryptographic algorithms currently in use in applications—ranging from cloud computing and smart phones all the way to industrial systems, block chains, and cryptocurrencies.

Cryptography is a critical component of today’s information infrastructure; it is what enables distributed information systems to exist and to work properly. Without it, users would not be able to securely authenticate themselves to websites, secure communications wouldn’t exist, and privacy would be unachievable. Moreover, the number of applications for cryptography have increased dramatically, as new cryptographic techniques are invented and proven secure. For example, securely transacting with cryptocurrencies such as bitcoin requires modern cryptography. As another example, hospitals may now share information about patients in a way that protects patient privacy while allowing the hospitals to apply statistical methods assessing the effectiveness of new treatments on the aggregate of the patients.

The book has many features that make it a unique source for students, practitioners and researchers. We focus on practical relevance by introducing the majority of cryptographic algorithms that are used in modern real-world applications. With respect to symmetric algorithms, we introduce the block ciphers AES, DES and triple-DES as well as PRESENT, which is an important example of a lightweight cipher. We also describe three popular stream ciphers. Regarding asymmetric cryptography, we cover all three public-key families currently in use: RSA, discrete logarithm schemes and elliptic curves. In addition, the book introduces hash functions, digital signatures and message authentication codes, or MACs. Beyond core cryptographic algorithms, we also discuss topics such as modes of operation, security services and key management. For every cryptographic scheme, up-to-date security estimations and recommendations for key lengths are given. We also discuss the important issue of software and hardware implementation.

Topics and features:

Opens with a foreword by cryptography pioneer and Turing Award winner, Ron Rivest
Helps develop a comprehensive understanding of modern applied cryptography
Provides a thorough introduction to post-quantum cryptography consisting of the three standardized cipher families
Includes for every chapter a comprehensive problem set, extensive examples, and a further-reading discussion
Communicates, using a unique pedagogical approach, the essentials about foundations and use in practice, while keeping mathematics to a minimum
Supplies up-to-date security parameters for all cryptographic algorithms
Incorporates chapter reviews and discussion on such topics as historical and societal context

This must-have book is indispensable as a textbook for graduate and advanced undergraduate courses, as well as for self-study by designers and engineers.

The authors have more than 20 years’ experience teaching cryptography at various universities in the US and Europe. In addition to being renowned scientists, they have extensive experience with applying cryptography in industry, fromwhich they have drawn important lessons for their teaching.

Скачать Understanding Cryptography: From Established Symmetric and Asymmetric Ciphers to Post-Quantum Algorithms 2nd Edition



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!











ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!


ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.