Introduction to Cryptography Principles and Applications
Due to the rapid growth of digital communication and electronic data exchange, information security has become a crucial issue in industry, business, and administration. Modern cryptography provides essential techniques for securing information and protec
- PDF / 3,642,003 Bytes
- 371 Pages / 439.37 x 666.142 pts Page_size
- 63 Downloads / 260 Views
Hans Delfs Helmut Knebl
Introduction to Cryptography Principles and Applications Second Edition
Authors
Series Editor
Prof. Dr. Hans Delfs Georg-Simon-Ohm University ¨ of Applied Sciences Nurnberg Department of Computer Science Keßlerplatz 12 ¨ 90489 Nurnberg Germany [email protected]
Prof. Dr. Ueli Maurer ¨ Theoretische Informatik Inst. fur ¨ ¨ ETH Zurich, 8092 Zurich Switzerland
Prof. Dr. Helmut Knebl Georg-Simon-Ohm University ¨ of Applied Sciences Nurnberg Department of Computer Science Keßlerplatz 12 ¨ 90489 Nurnberg Germany [email protected]
Library of Congress Control Number: 2007921676 ACM Computing Classification: E.3 ISSN 1619-7100 ISBN-13 978-3-540-49243-6 Springer Berlin Heidelberg New York This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springer.com © Springer-Verlag Berlin Heidelberg 2007 The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Typesetting: Integra, India Cover design: KünkelLopka, Heidelberg Printed on acid-free paper
SPIN: 11929970
45/3100/Integra
543210
Preface to the Second, Extended Edition
New topics have been included in the second edition. They reflect recent progress in the field of cryptography and supplement the material covered in the first edition. Major extensions and enhancements are the following. • A complete description of the Advanced Encryption Standard AES is given in Chapter 2 on symmetric encryption. • In Appendix A, there is a new section on polynomials and finite fields. There we offer a basic explanation of finite fields, which is necessary to understand the AES. • The description of cryptographic hash functions in Chapter 3 has been extended. It now also includes, for example, the HMAC construction of message authentication codes. • Bleichenbacher’s 1-Million-Chosen-Ciphertext Attack against schemes that implement the RSA encryption standard PKCS#1 is discussed in detail in Chapter 3. This attack proves that adaptively-chosen-ciphertext attacks can be a real danger in practice. • In Chapter 9 on provably secure encryption we have added typical security proofs for public-key encryption schemes that resist adaptively-chosenciphertext attacks. Two prominent examples are studied – Boneh’s simpleOAEP, or SAEP for short, and Cramer-Shoup’s pub
Data Loading...