Elliptic Curve Cryptography

Elliptic curve cryptography is an important class of algorithms. There are currently implementations of elliptic curve being used in digital certificates and for key exchange. This class of algorithms provides robust security but with a substantially smal

  • PDF / 9,749,857 Bytes
  • 403 Pages / 439.43 x 683.15 pts Page_size
  • 8 Downloads / 255 Views

DOWNLOAD

REPORT


Modern Cryptography Applied Mathematics for Encryption and Information Security

Modern Cryptography

William Easttom

Modern Cryptography Applied Mathematics for Encryption and Information Security

William Easttom Georgetown University Plano, TX, USA

ISBN 978-3-030-63114-7 ISBN 978-3-030-63115-4 https://doi.org/10.1007/978-3-030-63115-4

(eBook)

© The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG 2021 This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors, and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. This Springer imprint is published by the registered company Springer Nature Switzerland AG The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland

Introduction

Cryptography is an important but difficult topic. A great many professions require some level of use of cryptography. This includes programmers, network administrators, and cybersecurity professionals. However, such people often are not provided adequate training in cryptography. There are a number of excellent cryptography books available, but most assume some level of mathematical sophistication on the part of the reader. This renders them inaccessible to a substantial number of potential readers. The entire purpose of this book is to bridge this gap. If you are a mathematician or cryptographer, this book is not intended for you. In fact, you might feel frustrated that certain mathematical details are not fully explored. As one glaring example, there are no mathematical proofs in this book. This book is aimed at the person who wants or needs a better understanding of cryptography, but may not have a background in number theory, linear algebra, and other similar topics. When needed, just enough math is provided for you to follow along, and no more detail than is necessary. As a consequence, this book is meant to be accessible to a broad audience. Howe

Data Loading...