现代密码学中英文翻译部分Word文档格式.docx
- 文档编号:22529785
- 上传时间:2023-02-04
- 格式:DOCX
- 页数:51
- 大小:43.23KB
现代密码学中英文翻译部分Word文档格式.docx
《现代密码学中英文翻译部分Word文档格式.docx》由会员分享,可在线阅读,更多相关《现代密码学中英文翻译部分Word文档格式.docx(51页珍藏版)》请在冰豆网上搜索。
demonstratingnumerousattacksonsuchschemes,protocolsandsystemsundervariousrealworld
applicationscenarios.Thisbookchoosestointroduceasetofpracticalcryptographic
schemes,protocolsandsystems,manyofthemstandardsordefactoones,studiesthemclosely,
explainstheirworkingprinciples,discussestheirpracticalusages,andexaminestheirstrong
(i.e.,fit-for-application)securityproperties,oftenwithsecurityevidenceformallyestablished.
Thebookalsoincludesself-containedtheoreticalbackgroundmaterialthatisthefoundationfor
moderncryptography.
Copyright
Hewlett-Packard®
ProfessionalBooks
AShortDescriptionoftheBook
Preface
Scope
Acknowledgements
ListofFigures
ListofAlgorithms,ProtocolsandAttacks
PartI:
Introduction
Chapter1.BeginningwithaSimpleCommunicationGame
Section1.1.ACommunicationGame
Section1.2.CriteriaforDesirableCryptographicSystemsandProtocols
Section1.3.ChapterSummary
Exercises
Chapter2.WrestlingBetweenSafeguardandAttack
Section2.1.Introduction
Section2.2.Encryption
Section2.3.VulnerableEnvironment(theDolev-YaoThreatModel)
Section2.4.AuthenticationServers
Section2.5.SecurityPropertiesforAuthenticatedKeyEstablishment
Section2.6.ProtocolsforAuthenticatedKeyEstablishmentUsingEncryption
Section2.7.ChapterSummary
PartII:
MathematicalFoundations:
StandardNotation
Chapter3.ProbabilityandInformationTheory
Section3.1.Introduction
Section3.2.BasicConceptofProbability
Section3.3.Properties
Section3.4.BasicCalculation
Section3.5.RandomVariablesandtheirProbabilityDistributions
Section3.6.BirthdayParadox
Section3.7.InformationTheory
Section3.8.RedundancyinNaturalLanguages
Section3.9.ChapterSummary
Chapter4.ComputationalComplexity
Section4.1.Introduction
Section4.2.TuringMachines
Section4.3.DeterministicPolynomialTime
Section4.4.ProbabilisticPolynomialTime
Section4.5.Non-deterministicPolynomialTime
Section4.6.Non-PolynomialBounds
Section4.7.Polynomial-timeIndistinguishability
Section4.8.TheoryofComputationalComplexityandModernCryptography
Section4.9.ChapterSummary
Chapter5.AlgebraicFoundations
Section5.1.Introduction
Section5.2.Groups
Section5.3.RingsandFields
Section5.4.TheStructureofFiniteFields
Section5.5.GroupConstructedUsingPointsonanEllipticCurve
Section5.6.ChapterSummary
Chapter6.NumberTheory
Section6.1.Introduction
Section6.2.CongruencesandResidueClasses
Section6.3.Euler'
sPhiFunction
Section6.4.TheTheoremsofFermat,EulerandLagrange
Section6.5.QuadraticResidues
Section6.6.SquareRootsModuloInteger
Section6.7.BlumIntegers
Section6.8.ChapterSummary
PartIII:
BasicCryptographicTechniques
Chapter7.Encryption—SymmetricTechniques
Section7.1.Introduction
Section7.2.Definition
Section7.3.SubstitutionCiphers
Section7.4.TranspositionCiphers
Section7.5.ClassicalCiphers:
UsefulnessandSecurity
Section7.6.TheDataEncryptionStandard(DES)
Section7.7.TheAdvancedEncryptionStandard(AES)
Section7.8.ConfidentialityModesofOperation
Section7.9.KeyChannelEstablishmentforSymmetricCryptosystems
Section7.10.ChapterSummary
Chapter8.Encryption—AsymmetricTechniques
Section8.1.Introduction
Section8.2.Insecurityof"
TextbookEncryptionAlgorithms"
Section8.3.TheDiffie-HellmanKeyExchangeProtocol
Section8.4.TheDiffie-HellmanProblemandtheDiscreteLogarithmProblem
Section8.5.TheRSACryptosystem(TextbookVersion)
Section8.6.CryptanalysisAgainstPublic-keyCryptosystems
Section8.7.TheRSAProblem
Section8.8.TheIntegerFactorizationProblem
Section8.9.InsecurityoftheTextbookRSAEncryption
Section8.10.TheRabinCryptosystem(TextbookVersion)
Section8.11.InsecurityoftheTextbookRabinEncryption
Section8.12.TheElGamalCryptosystem(TextbookVersion)
Section8.13.InsecurityoftheTextbookElGamalEncryption
Section8.14.NeedforStrongerSecurityNotionsforPublic-keyCryptosystems
Section8.15.CombinationofAsymmetricandSymmetricCryptography
Section8.16.KeyChannelEstablishmentforPublic-keyCryptosystems
Section8.17.ChapterSummary
Chapter9.InAnIdealWorld:
BitSecurityofTheBasicPublic-KeyCryptographicFunctions
Section9.1.Introduction
Section9.2.TheRSABit
Section9.3.TheRabinBit
Section9.4.TheElGamalBit
Section9.5.TheDiscreteLogarithmBit
Section9.6.ChapterSummary
Chapter10.DataIntegrityTechniques
Section10.1.Introduction
Section10.2.Definition
Section10.3.SymmetricTechniques
Section10.4.AsymmetricTechniquesI:
DigitalSignatures
Section10.5.AsymmetricTechniquesII:
DataIntegrityWithoutSourceIdentification
Section10.6.ChapterSummary
PartIV:
Authentication
Chapter11.AuthenticationProtocols—Principles
Section11.1.Introduction
Section11.2.AuthenticationandRefinedNotions
Section11.3.Convention
Section11.4.BasicAuthenticationTechniques
Section11.5.Password-basedAuthentication
Section11.6.AuthenticatedKeyExchangeBasedonAsymmetricCryptography
Section11.7.TypicalAttacksonAuthenticationProtocols
Section11.8.ABriefLiteratureNote
Section11.9.ChapterSummary
Chapter12.AuthenticationProtocols—TheRealWorld
Section12.1.Introduction
Section12.2.AuthenticationProtocolsforInternetSecurity
Section12.3.TheSecureShell(SSH)RemoteLoginProtocol
Section12.4.TheKerberosProtocolanditsRealizationinWindows2000
Section12.5.SSLandTLS
Section12.6.ChapterSummary
Chapter13.AuthenticationFrameworkforPublic-KeyCryptography
Section13.1.Introduction
Section13.2.Directory-BasedAuthenticationFramework
Section13.3.Non-DirectoryBasedPublic-keyAuthenticationFramework
Section13.4.ChapterSummary
PartV:
FormalApproachestoSecurityEstablishment
Chapter14.FormalandStrongSecurityDefinitionsforPublic-KeyCryptosystems
Section14.1.Introduction
Section14.2.AFormalTreatmentforSecurity
Section14.3.SemanticSecurity—theDebutofProvableSecurity
Section14.4.InadequacyofSemanticSecurity
Section14.5.BeyondSemanticSecurity
Section14.6.ChapterSummary
Chapter15.ProvablySecureandEfficientPublic-KeyCryptosystems
Section15.1.Introduction
Section15.2.TheOptimalAsymmetricEncryptionPadding
Section15.3.TheCramer-ShoupPublic-keyCryptosystem
Section15.4.AnOverviewofProvablySecureHybridCryptosystems
Section15.5.LiteratureNotesonPracticalandProvablySecurePublic-keyCryptosystems
Section15.6.ChapterSummary
Section15.7.Exercises
Chapter16.StrongandProvableSecurityforDigitalSignatures
Section16.1.Introduction
Section16.2.StrongSecurityNotionforDigitalSignatures
Section16.3.StrongandProvableSecurityforElGamal-familySignatures
Section16.4.Fit-for-applicationWaysforSigninginRSAandRabin
Section16.5.Signcryption
Section16.6.ChapterSummary
Section16.7.Exercises
Chapter17.FormalMethodsforAuthenticationProtocolsAnalysis
Section17.1.Introduction
Section17.2.TowardFormalSpecificationofAuthenticationProtocols
Section17.3.AComputationalViewofCorrectProtocols—theBellare-RogawayModel
Section17.4.ASymbolicManipulationViewofCorrectProtocols
Section17.5.FormalAnalysisTechniques:
StateSystemExploration
Section17.6.ReconcilingTwoViewsofFormalTechniquesforSecurity
Section17.7.ChapterSummary
PartVI:
CryptographicProtocols
Chapter18.Zero-KnowledgeProtocols
Section18.1.Introduction
Section18.2.BasicDefinitions
Section18.3.Zero-knowledgeProperties
Section18.4.ProoforArgument?
Section18.5.ProtocolswithTwo-sided-error
Section18.6.RoundEfficiency
Section18.7.Non-interactiveZero-knowledge
Section18.8.ChapterSummary
Chapter19.Returningto"
CoinFlippingOverTelephone"
Section19.1.Blum'
s"
Coin-Flipping-By-Telephone"
Protocol
Section19.2.SecurityAnalysis
Section19.3.Efficiency
Section19.4.ChapterSummary
Chapter20.Afterremark
Bibliography
LibraryofCongressCataloging-in-PublicationData
ACIPcatalogrecordforthisbookcanbeobtainedfromtheLibraryofCongress.
Editorial/productionsupervision:
MarySudul
Coverdesigndirector:
JerryVotta
Coverdesign:
TalarBoorujy
Manufacturingmanager:
MauraZaldivar
Acquisitionseditor:
JillHarry
Marketingmanager:
DanDePasquale
Publisher,Hewlett-PackardBooks:
WalterBruce
Manycryptographicschemesandprotocols,especiallythosebasedonpublic-keycryptography,
versions,astheseversionsareusuallythesubjectsf
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 现代 密码学 中英文 翻译 部分