Home > Store

Modern Cryptography: Theory and Practice (paperback)

Register your product to gain access to bonus material or receive a coupon.

Modern Cryptography: Theory and Practice (paperback)

  • By
  • Published Jul 25, 2003 by Pearson.

Book

  • Sorry, this book is no longer in print.
Not for Sale

About

Features

  • Realistic guidance on building “fit for application” cryptographic systems—Shows students why conventional cryptographic implementations are often inadequate, and how to build systems that are far more secure.
    • Helps students go beyond theory to build next-generation cryptographic systems that overcome the limitations of current technologies.

  • Sophisticated formal methods—Introduces advanced formal methods for demonstrating the security of cryptographic systems and protocols.
    • Helps students design cryptographic systems that are demonstrably secure.

  • Assessments of key cryptographic standards—Compares and evaluates contemporary encryption protocols and standards, including IPSec, IKE, SSH, SSL, TLS, and Kerberos.
    • Helps students understand how todays leading encryption protocols and standards were designed, and recognise their vulnerabilities.

  • Essential mathematics for advanced cryptography—Presents all the math students will need, including probability and information theory, computational complexity, and algebraic foundations.
    • Enables students to master advanced cryptographic design and development, even if they come to the course without a thorough grounding in the mathematics.

  • Extensive practical examples—Presents realistic implementation examples for a wide range of cryptographic systems.
    • Helps students more clearly understand how cryptographic theory can be translated into real-world implementation.

  • By one of the fields leading experts—By Wenbo Mao, leader of Hewlett-Packards contributions to the European Unions Secure Electronic Commerce Transactions (CASENET), a research project.
    • Gives students confidence that they are receiving state-of-the-art information that is thorough, accurate, clear, and useful.

Description

  • Copyright 2004
  • Dimensions: 7" x 9-1/4"
  • Pages: 752
  • Edition: 1st
  • Book
  • ISBN-10: 0-13-288741-X
  • ISBN-13: 978-0-13-288741-0

"This book would be a good addition to any cryptographer's bookshelf. The book is self-contained; it presents all the background material to understand an algorithm and all the development to prove its security. I'm not aware of another book that's as complete as this one."

--Christian Paquin, Cryptographic/Security Developer, Silanis Technology Inc. "The book is both complete, and extraordinarily technically accurate. It would certainly be a useful addition to any cryptographer's or crypto-engineer's library."

--Marcus Leech, Advisor, Security Architecture and Planning, Nortel Networks Build more secure crypto systems--and prove their trustworthiness Modern Cryptography is the indispensable resource for every technical professional who needs to implement strong security in real-world applications.

Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents practical examples throughout and provides all the mathematical background you'll need.

Coverage includes:

  • Crypto foundations: probability, information theory, computational complexity, number theory, algebraic techniques, and more
  • Authentication: basic techniques and principles vs. misconceptions and consequential attacks
  • Evaluating real-world protocol standards including IPSec, IKE, SSH, TLS (SSL), and Kerberos
  • Designing stronger counterparts to vulnerable "textbook" crypto schemes

Mao introduces formal and reductionist methodologies to prove the "fit-for-application" security of practical encryption, signature, signcryption, and authentication schemes. He gives detailed explanations for zero-knowledge protocols: definition, zero-knowledge properties, equatability vs. simulatability, argument vs. proof, round-efficiency, and non-interactive versions.

Sample Content

Table of Contents

  • I. INTRODUCTION.
  • 1. Beginning with a Simple Communication Game.
  • 2. Wrestling between Safeguard and Attack.
  • II MATHEMATICAL FOUNDATIONS.
  • 3. Probability and Information Theory.
  • 4. Computational Complexity.
  • 5. Algebraic Foundations.
  • 6. Number Theory.
  • III. BASIC CRYPTOGRAPHIC TECHNIQUES.
  • 7. Encryption—Symmetric Techniques.
  • 8. Encryption—Asymmetric Techniques.
  • 9. In an Ideal World: Bit Security of the Basic Public-Key Cryptographic Functions.
  • 10. Data Integrity Techniques.
  • IV. AUTHENTICATION.
  • 11. Authentication Protocols—Principles.
  • 12. Authentication Protocols—The Real World.
  • 13. Authentication Framework for Public-Key Cryptography.
  • V. FORMAL APPROACHES TO SECURITY ESTABLISHMENT.
  • 14. Formal and Strong Security Definitions for Public-Key Cryptosystems.
  • 15. Provably Secure and Efficient Public-Key Cryptosystems.
  • 16. Strong and Provable Security for Digital Signatures.
  • 17. Formal Methods for Authentication Protocols Analysis.
  • VI. CRYPTOGRAPHIC PROTOCOLS.
  • 18. Zero-Knowledge Protocols.
  • 19. Returning To “Coin Flipping over Telephone”.
  • 20. Afterremark.

Updates

Submit Errata

More Information

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.