Author |
---|

Rolf Oppliger, Ph.D.

eSECURITY Technologies Rolf Oppliger

Breichtenstrasse 18

CH-3074 Muri b. Bern, Switzerland

E-Mail: rolf.oppliger@esecurity.ch

Phone/Fax: +41 079 654 84 37

Aims and Scope |
---|

The book provides an overview about contemporary cryptography.

Target Audience |
---|

The book is intended for computer scientists, electrical engineers, and mathematicians both in research and practice. The book is also intended for computer practitioners, consultants, and information officers who want to gain some insight into the fascinating and fastly evolving field.

Table of Contents |
---|

Foreword by Gene Spafford

Preface

1. Introduction

2. Cryptographic Systems

**Part I: Unkeyed Cryptosystems **

3. One-Way Functions

4. Cryptographic Hash Functions

5. Random Bit Generators

**Part II: Secret Key Cryptosystems **

6. Symmetric Encryption Systems

7. Message Authentication Systems

8. Pseudorandom Bit Generators

9. Pseudorandom Functions

**Part III: Public Key Cryptosystems **

10. Asymmetric Encryption Systems

11. Digital Signature Systems

12. Key Establishment

13. Entity Authentication

14. Secure Multi-Party Computation

**Part IV: Conclusions**

15. Key Management

16. Summary

17. Outlook

Appendix A: Discrete Mathematics

Appendix B: Probability Theory

Appendix C: Information Theory

Appendix D: Complexity Theory

List of Symbols

Abbreviations and Acronyms

About the Author

Index

Reviews |
---|

- Ulrich Tipp, Zentralblatt MATH (Zbl 1237.94082)

Errata List |
---|

- Page 121, line 21: In reference [16], the word "May" between "August" and "2008" is obsolete and should be removed
- Page 219, bottom: In each formula, the invocation of the function is missing, i.e., s_i = s_0 + i must be replaced with s_i = f(s_0 + i) for i=1,2,3
- Page 476, line 16: The word "Appendix" must be replaced with "factorization"

News |
---|

Additional Material |
---|

- A set of slides is published with a Creative Commons Attribution No Derivatives (cc by-nd) 3.0 license (view licence deed, view legal code). Please, feel free to download and use the slides at will (e.g., to teach classes on contemporary cryptography). We appreciate any feedback or comment.
- The CrypTool can be used to visualize and experiment with most cryptographic algorithms and protocols addressed in the book.

© 2011 Rolf Oppliger