By José Luis Gómez Pardo

ISBN-10: 3642321658

ISBN-13: 9783642321658

ISBN-10: 3642321666

ISBN-13: 9783642321665

This creation to cryptography employs a programming-oriented method of research crucial cryptographic schemes in present use and the most cryptanalytic assaults opposed to them. dialogue of the theoretical points, emphasizing specified defense definitions in response to methodological instruments equivalent to complexity and randomness, and of the mathematical elements, with emphasis on number-theoretic algorithms and their purposes to cryptography and cryptanalysis, is built-in with the programming technique, hence offering implementations of the algorithms and schemes in addition to examples of lifelike measurement.

A virtue of the author's procedure is using Maple as a programming atmosphere within which not only the cryptographic primitives but in addition an important cryptographic schemes are carried out following the techniques of criteria our bodies corresponding to NIST, with the various recognized cryptanalytic assaults applied besides. the aim of the Maple implementations is to enable the reader scan and examine, and accordingly the writer contains quite a few examples. The e-book discusses vital contemporary matters equivalent to homomorphic encryption, identity-based cryptography and elliptic curve cryptography. The algorithms and schemes that are handled intimately and applied in Maple contain AES and modes of operation, CMAC, GCM/GMAC, SHA-256, HMAC, RSA, Rabin, Elgamal, Paillier, Cocks IBE, DSA and ECDSA. moreover, a few lately brought schemes having fun with robust safety homes, similar to RSA-OAEP, Rabin-SAEP, Cramer--Shoup, and PSS, also are mentioned and applied. at the cryptanalysis part, Maple implementations and examples are used to debate many very important algorithms, together with birthday and man-in-the-middle assaults, integer factorization algorithms akin to Pollard's rho and the quadratic sieve, and discrete log algorithms akin to baby-step giant-step, Pollard's rho, Pohlig--Hellman and the index calculus method.

This textbook is appropriate for complex undergraduate and graduate scholars of computing device technological know-how, engineering and arithmetic, gratifying the necessities of assorted different types of classes: a easy introductory path; a theoretically orientated path whose concentration is at the distinct definition of defense strategies and on cryptographic schemes with reductionist protection proofs; a practice-oriented direction requiring little mathematical history and with an emphasis on purposes; or a mathematically complicated direction addressed to scholars with a much better mathematical heritage. the most prerequisite is a uncomplicated wisdom of linear algebra and hassle-free calculus, and whereas a few wisdom of likelihood and summary algebra will be valuable, it isn't crucial as the booklet contains the required historical past from those matters and, additionally, explores the number-theoretic fabric intimately. The e-book can be a entire reference and is appropriate for self-study via practitioners and programmers.