Preface |
|
xi | |
|
Overview of Cryptography and Its Applications |
|
|
1 | (11) |
|
|
2 | (7) |
|
Cryptographic Applications |
|
|
9 | (3) |
|
|
12 | (51) |
|
|
13 | (1) |
|
|
14 | (2) |
|
|
16 | (8) |
|
|
24 | (3) |
|
|
27 | (3) |
|
The Playfair and ADFGX Ciphers |
|
|
30 | (4) |
|
|
34 | (4) |
|
|
38 | (1) |
|
|
39 | (2) |
|
Pseudo-random Bit Generation |
|
|
41 | (2) |
|
|
43 | (7) |
|
|
50 | (5) |
|
|
55 | (4) |
|
|
59 | (4) |
|
|
63 | (50) |
|
|
63 | (6) |
|
|
69 | (1) |
|
|
70 | (6) |
|
The Chinese Remainder Theorem |
|
|
76 | (2) |
|
|
78 | (1) |
|
|
79 | (4) |
|
|
83 | (2) |
|
|
85 | (1) |
|
|
86 | (2) |
|
Legendre and Jacobi Symbols |
|
|
88 | (5) |
|
|
93 | (9) |
|
|
102 | (2) |
|
|
104 | (7) |
|
|
111 | (2) |
|
The Data Encryption Standard |
|
|
113 | (38) |
|
|
113 | (1) |
|
A Simplified DES-Type Algorithm |
|
|
114 | (4) |
|
Differential Cryptanalysis |
|
|
118 | (5) |
|
|
123 | (8) |
|
|
131 | (8) |
|
|
139 | (4) |
|
Meet-in-the-Middle Attacks |
|
|
143 | (1) |
|
|
144 | (2) |
|
|
146 | (3) |
|
|
149 | (2) |
|
The Advanced Encryption Standard: Rijndael |
|
|
151 | (13) |
|
|
152 | (2) |
|
|
154 | (4) |
|
|
158 | (3) |
|
|
161 | (1) |
|
|
162 | (2) |
|
|
164 | (37) |
|
|
164 | (5) |
|
|
169 | (7) |
|
|
176 | (5) |
|
|
181 | (6) |
|
|
187 | (2) |
|
An Application to Treaty Verification |
|
|
189 | (1) |
|
|
189 | (3) |
|
|
192 | (5) |
|
|
197 | (4) |
|
|
201 | (17) |
|
|
201 | (1) |
|
|
202 | (7) |
|
|
209 | (1) |
|
Diffie-Hellman Key Exchange |
|
|
210 | (2) |
|
The ElGamal Public Key Cryptosystem |
|
|
212 | (2) |
|
|
214 | (2) |
|
|
216 | (2) |
|
|
218 | (26) |
|
|
218 | (4) |
|
|
222 | (2) |
|
The Secure Hash Algorithm |
|
|
224 | (5) |
|
|
229 | (3) |
|
|
232 | (3) |
|
|
235 | (3) |
|
Using Hash Functions to Encrypt |
|
|
238 | (1) |
|
|
239 | (3) |
|
|
242 | (2) |
|
|
244 | (12) |
|
|
245 | (1) |
|
The ElGamal Signature Scheme |
|
|
246 | (3) |
|
|
249 | (1) |
|
Birthday Attacks on Signatures |
|
|
250 | (1) |
|
The Digital Signature Algorithm |
|
|
251 | (1) |
|
|
252 | (3) |
|
|
255 | (1) |
|
|
256 | (31) |
|
Intruders-in-the-Middle and Impostors |
|
|
257 | (2) |
|
|
259 | (7) |
|
|
266 | (4) |
|
Public Key Infrastructures (PKI) |
|
|
270 | (1) |
|
|
271 | (6) |
|
|
277 | (3) |
|
|
280 | (3) |
|
Secure Electronic Transaction |
|
|
283 | (2) |
|
|
285 | (2) |
|
|
287 | (9) |
|
|
287 | (7) |
|
|
294 | (2) |
|
|
296 | (11) |
|
|
296 | (1) |
|
|
297 | (6) |
|
|
303 | (2) |
|
|
305 | (2) |
|
|
307 | (9) |
|
Flipping Coins over the Telephone |
|
|
307 | (2) |
|
|
309 | (5) |
|
|
314 | (2) |
|
Zero-Knowledge Techniques |
|
|
316 | (9) |
|
|
316 | (3) |
|
The Feige-Fiat-Shamir Identification Scheme |
|
|
319 | (2) |
|
|
321 | (4) |
|
|
325 | (22) |
|
|
326 | (2) |
|
|
328 | (5) |
|
|
333 | (2) |
|
|
335 | (3) |
|
|
338 | (5) |
|
|
343 | (4) |
|
|
347 | (29) |
|
|
347 | (5) |
|
|
352 | (4) |
|
Factoring with Elliptic Curves |
|
|
356 | (4) |
|
Elliptic Curves in Characteristic 2 |
|
|
360 | (3) |
|
Elliptic Curve Cryptosystems |
|
|
363 | (3) |
|
Identity-Based Encryption |
|
|
366 | (4) |
|
|
370 | (4) |
|
|
374 | (2) |
|
|
376 | (16) |
|
|
376 | (1) |
|
|
377 | (5) |
|
|
382 | (3) |
|
|
385 | (5) |
|
|
390 | (2) |
|
|
392 | (58) |
|
|
392 | (6) |
|
|
398 | (4) |
|
|
402 | (6) |
|
|
408 | (8) |
|
|
416 | (1) |
|
|
417 | (9) |
|
|
426 | (6) |
|
|
432 | (8) |
|
|
440 | (2) |
|
The McEliece Cryptosystem |
|
|
442 | (2) |
|
|
444 | (1) |
|
|
445 | (4) |
|
|
449 | (1) |
|
Quantum Techniques in Cryptography |
|
|
450 | (17) |
|
|
451 | (3) |
|
|
454 | (2) |
|
|
456 | (10) |
|
|
466 | (1) |
|
|
467 | (28) |
|
Getting Started with Mathematica |
|
|
467 | (2) |
|
|
469 | (1) |
|
|
470 | (7) |
|
|
477 | (3) |
|
|
480 | (7) |
|
|
487 | (1) |
|
|
487 | (1) |
|
|
488 | (2) |
|
|
490 | (5) |
|
|
495 | (32) |
|
Getting Started with Maple |
|
|
495 | (1) |
|
|
496 | (2) |
|
|
498 | (7) |
|
|
505 | (4) |
|
|
509 | (8) |
|
|
517 | (1) |
|
|
518 | (1) |
|
|
519 | (2) |
|
|
521 | (6) |
|
|
527 | (38) |
|
Getting Started with Matlab |
|
|
528 | (5) |
|
|
533 | (11) |
|
|
544 | (4) |
|
|
548 | (5) |
|
|
553 | (1) |
|
|
553 | (1) |
|
|
554 | (2) |
|
|
556 | (8) |
|
D Suggestions for Further Reading |
|
|
564 | |
Bibliography |
|
565 | (6) |
Index |
|
571 | |