A Classical Introduction to Cryptography Applications for Communicat
A Classical Introduction to Cryptography: Applications for Communications Security introduces fundamentals of information and communication security by providing appropriate mathematical concepts to prove or break the security of cryptographic
- PDF / 2,465,975 Bytes
- 344 Pages / 441 x 666 pts Page_size
- 19 Downloads / 235 Views
A CLASSICAL INTRODUCTION TO CRYPTOGRAPHY Applications for Communications Security by
Serge Vaudenay Swiss Federal Institute of Technologies (EPFL)
Serge Vaudenay Ch. de Riant-Mont 4 CH-1023 Crissier Switzerland
Library of Congress Cataloging-in-Publication Data A C.I.P. Catalogue record for this book is available from the Library of Congress. A CLASSICAL INTRODUCTION TO MODERN CRYPTOGRAPHY Applications for Communications Security by Serge Vaudenay Swiss Fédéralel Institute of Technologies (EPFL)
ISBN-10: 0-387-25464-1 ISBN-13: 978-0-387-25464-7
e-ISBN-10: 0-387-25880-9 e-ISBN-13: 978-0-387-25880-5
Printed on acid-free paper. ¤ 2006 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now know or hereafter developed is forbidden. The use in this publication of trade names, trademarks, service marks and similar terms, even if the are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights. Printed in the United States of America. 9 8 7 6 5 4 3 2 1 springeronline.com
SPIN 11357582, 11426141
To Christine and Emilien
Contents Preamble . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
xv
1 Prehistory of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1 Foundations of Conventional Cryptography . . . . . . . . . . . . . . . . . . . . 1.1.1 The Origins of Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.2 Key Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.3 Transpositions, Substitutions, and Secret Keys . . . . . . . . . . . . 1.1.4 Vernam Cipher . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.1.5 Enigma: Toward Industrial Cryptography . . . . . . . . . . . . . . . . 1.2 Roots of Modern Cryptography . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2.1 Cryptographic Problems: The Fundamental Trilogy . . . . . . . . 1.2.2 Assumptions of Modern Cryptography . . . . . . . . . . . . . . . . . . 1.2.3 Adversarial Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.2.4 Cryptography from Various Perspectives . . . . . . . . . . . . . . . . 1.2.5 Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3 The Shannon Theory of Secrecy . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.1 Secrecy of Communication . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.2 Entropy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1.3.3 Perfect Secrecy . . . . . . . .
Data Loading...