Keith Martin
- Published in print:
- 2017
- Published Online:
- July 2017
- ISBN:
- 9780198788003
- eISBN:
- 9780191829956
- Item type:
- book
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198788003.001.0001
- Subject:
- Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing ...
More
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.Less
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient technologies and overwhelming theoretical research. The first part of the book provides essential background, identifying the core security services provided by cryptography. The next part introduces the main cryptographic mechanisms that deliver these security services such as encryption, hash functions, and digital signatures, discussing why they work and how to deploy them, without delving into any significant mathematical detail. In the third part, the important practical aspects of key management are introduced, which is essential for making cryptography work in real systems. The last part considers the application of cryptography. A range of application case studies is presented, alongside a discussion of the wider societal issues arising from use of cryptography to support contemporary cyber security.
Jean-François Blanchette
- Published in print:
- 2012
- Published Online:
- August 2013
- ISBN:
- 9780262017510
- eISBN:
- 9780262301565
- Item type:
- chapter
- Publisher:
- The MIT Press
- DOI:
- 10.7551/mitpress/9780262017510.003.0003
- Subject:
- Information Science, Information Science
This chapter focuses on the 1976 publication of Whit Diffie and Martin Hellman’s “New Directions in Cryptography,” which is considers a turning point in the history of cryptographic innovation. It ...
More
This chapter focuses on the 1976 publication of Whit Diffie and Martin Hellman’s “New Directions in Cryptography,” which is considers a turning point in the history of cryptographic innovation. It explains that the book argued not only for radically new applications of cryptography for the coming age of computer networks, but also for a new paradigm of provable security based on the certification of cryptosystems through the mathematical frameworks of complexity theory and algorithmics. It also describes the emergence of cryptography in the 1990s as the Internet’s first native political movement and cyberlibertarianism’s most prominent voice.Less
This chapter focuses on the 1976 publication of Whit Diffie and Martin Hellman’s “New Directions in Cryptography,” which is considers a turning point in the history of cryptographic innovation. It explains that the book argued not only for radically new applications of cryptography for the coming age of computer networks, but also for a new paradigm of provable security based on the certification of cryptosystems through the mathematical frameworks of complexity theory and algorithmics. It also describes the emergence of cryptography in the 1990s as the Internet’s first native political movement and cyberlibertarianism’s most prominent voice.
Andreas Bolfing
- Published in print:
- 2020
- Published Online:
- October 2020
- ISBN:
- 9780198862840
- eISBN:
- 9780191895463
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198862840.003.0003
- Subject:
- Mathematics, Computational Mathematics / Optimization, Logic / Computer Science / Mathematical Philosophy
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and ...
More
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.Less
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.
Sandip Tiwari
- Published in print:
- 2017
- Published Online:
- August 2017
- ISBN:
- 9780198759874
- eISBN:
- 9780191820847
- Item type:
- chapter
- Publisher:
- Oxford University Press
- DOI:
- 10.1093/oso/9780198759874.003.0003
- Subject:
- Physics, Condensed Matter Physics / Materials, Atomic, Laser, and Optical Physics
Unique nanoscale phenomena arise in quantum and mesoscale properties and there are additional intriguing twists from effects that are classical in origin. In this chapter, these are brought forth ...
More
Unique nanoscale phenomena arise in quantum and mesoscale properties and there are additional intriguing twists from effects that are classical in origin. In this chapter, these are brought forth through an exploration of quantum computation with the important notions of superposition, entanglement, non-locality, cryptography and secure communication. The quantum mesoscale and implications of nonlocality of potential are discussed through Aharonov-Bohm effect, the quantum Hall effect in its various forms including spin, and these are unified through a topological discussion. Single electron effect as a classical phenomenon with Coulomb blockade including in multiple dot systems where charge stability diagrams may be drawn as phase diagram is discussed, and is also extended to explore the even-odd and Kondo consequences for quantum-dot transport. This brings up the self-energy discussion important to nanoscale device understanding.Less
Unique nanoscale phenomena arise in quantum and mesoscale properties and there are additional intriguing twists from effects that are classical in origin. In this chapter, these are brought forth through an exploration of quantum computation with the important notions of superposition, entanglement, non-locality, cryptography and secure communication. The quantum mesoscale and implications of nonlocality of potential are discussed through Aharonov-Bohm effect, the quantum Hall effect in its various forms including spin, and these are unified through a topological discussion. Single electron effect as a classical phenomenon with Coulomb blockade including in multiple dot systems where charge stability diagrams may be drawn as phase diagram is discussed, and is also extended to explore the even-odd and Kondo consequences for quantum-dot transport. This brings up the self-energy discussion important to nanoscale device understanding.