Introduction to Cryptography Principles and Applications
The first part of this book covers the key concepts of cryptography on an undergraduate level, from encryption and digital signatures to cryptographic protocols. Essential techniques are demonstrated in protocols for key exchange, user identification, ele
- PDF / 4,412,631 Bytes
- 529 Pages / 439.42 x 683.15 pts Page_size
- 12 Downloads / 231 Views
Hans Delfs Helmut Knebl
Introduction to Cryptography Principles and Applications Third Edition
Information Security and Cryptography
Series Editors David Basin Kenny Paterson Advisory Board Michael Backes Gilles Barthe Ronald Cramer Ivan Damgård Andrew D. Gordon Joshua D. Guttman Christoph Kruegel Ueli Maurer Tatsuaki Okamoto Adrian Perrig Bart Preneel
More information about this series at http://www.springer.com/series/4752
Hans Delfs • Helmut Knebl
Introduction to Cryptography Principles and Applications Third Edition
Hans Delfs Department of Computer Science Technische Hochschule Nürnberg Georg Simon Ohm Nürnberg, Germany
Helmut Knebl Department of Computer Science Technische Hochschule Nürnberg Georg Simon Ohm Nürnberg, Germany
ISSN 1619-7100 ISSN 2197-845X (electronic) Information Security and Cryptography ISBN 978-3-662-47973-5 ISBN 978-3-662-47974-2 (eBook) DOI 10.1007/978-3-662-47974-2 Library of Congress Control Number: 2015949232 Springer Heidelberg New York Dordrecht London © Springer-Verlag Berlin Heidelberg 2015 This work is subject to copyright. All rights are reserved by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made. Printed on acid-free paper Springer-Verlag GmbH Berlin Heidelberg is part of Springer Science+Business Media (www.springer.com)
Preface to the Third, Extended Edition
The third edition is a substantive extension. This is reflected in a considerable increase in pages. A number of new topics have been included. They supplement and extend the material covered in the previous editions. The major extensions and enhancements follow: • We added a description of the new SHA-3 algorithm for cryptographic hash functions, Keccak, and the underlying sponge construction (Section 2.2.2). • As a further important example of homomorphic encryption algorithms, Paillier encryption is introduced in Section 3.6.2. • ElGamal encryption in a prime-order subgroup of a finite field is studied in detail in Section 3.4.4. • An introduction to elliptic curve cryptosystems including Diffie–Hellman key exchange, ElGamal encrypti
Data Loading...