Cryptographic Backdoors
Cryptographic backdoors are a special type of cryptographic attack. These are alterations in cryptographic algorithms and protocols to allow the attacker to subvert the security of the algorithm. Creating cryptographic backdoors is not particularly diffic
- PDF / 9,749,857 Bytes
- 403 Pages / 439.43 x 683.15 pts Page_size
- 0 Downloads / 234 Views
Modern Cryptography Applied Mathematics for Encryption and Information Security
Modern Cryptography
William Easttom
Modern Cryptography Applied Mathematics for Encryption and Information Security
William Easttom Georgetown University Plano, TX, USA
ISBN 978-3-030-63114-7 ISBN 978-3-030-63115-4 https://doi.org/10.1007/978-3-030-63115-4
(eBook)
© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Introduction
Cryptography is an important but difficult topic. A great many professions require some level of use of cryptography. This includes programmers, network administrators, and cybersecurity professionals. However, such people often are not provided adequate training in cryptography. There are a number of excellent cryptography books available, but most assume some level of mathematical sophistication on the part of the reader. This renders them inaccessible to a substantial number of potential readers. The entire purpose of this book is to bridge this gap. If you are a mathematician or cryptographer, this book is not intended for you. In fact, you might feel frustrated that certain mathematical details are not fully explored. As one glaring example, there are no mathematical proofs in this book. This book is aimed at the person who wants or needs a better understanding of cryptography, but may not have a background in number theory, linear algebra, and other similar topics. When needed, just enough math is provided for you to follow along, and no more detail than is necessary. As a consequence, this book is meant to be accessible to a broad audience. Howe
Data Loading...