Cryptography Theory and Practice, Third Edition

ISBN-10: 1584885084

ISBN-13: 9781584885085

Edition: 3rd 2005 (Revised)

List price: $76.95 Buy it from $23.98
eBook available
This item qualifies for FREE shipping

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered enormous praise and popularity, and soon became the standard textbook for cryptography courses around the world. The second edition was equally embraced, and enjoys status as a perennial bestseller. Now in its third edition, this authoritative text continues to provide a solid foundation for future breakthroughs in cryptography.WHY A THIRD EDITION?The art and science of cryptography has been evolving for thousands of years. Now, with unprecedented amounts of information circling the globe, we must be prepared to face new threats and employ new encryption schemes on an ongoing basis. This edition updates relevant chapters with the latest advances and includes seven additional chapters covering: Pseudorandom bit generation in cryptography Entity authentication, including schemes built from primitives and special purpose "zero-knowledge" schemes Key establishment including key distribution and protocols for key agreement, both with a greater emphasis on security models and proofs Public key infrastructure, including identity-based cryptography Secret sharing schemes Multicast security, including broadcast encryption and copyright protectionTHE RESULTProviding mathematical background in a "just-in-time" fashion, informal descriptions of cryptosystems along with more precise pseudocode, and a host of numerical examples and exercises, Cryptography: Theory and Practice, Third Edition offers comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the mind-boggling amount of information circulating around the world.

New Starting from $84.06
eBooks Starting from $30.78
Rent eBooks
Buy eBooks
what's this?
Rush Rewards U
Members Receive:
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Calculus 1 Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought


Book details

List price: $76.95
Edition: 3rd
Copyright year: 2005
Publisher: CRC Press LLC
Publication date: 11/1/2005
Binding: Hardcover
Pages: 616
Size: 6.25" wide x 9.25" long x 1.25" tall
Weight: 2.398
Language: English

Craig Stinson is a journalist and author. He has written or coauthored more than 20 books including Windows Vista� Inside Out, Deluxe Edition and Microsoft� Office Excel� 2007 Inside Out.

Classical Cryptography
Introduction: Some Simple Cryptosystems
The Shift Cipher
The Substitution Cipher
The Affine Cipher
The Vigenere Cipher
The Hill Cipher
The Permutation Cipher
Stream Ciphers
Cryptanalysis of the Affine Cipher
Cryptanalysis of the Substitution Cipher
Cryptanalysis of the Vigenere Cipher
Cryptanalysis of the Hill Cipher
Cryptanalysis of the LFSR Stream Cipher
Shannon's Theory
Elementary Probability Theory
Perfect Secrecy
Huffman Encodings
Properties of Entropy
Spurious Keys and Unicity Distance
Product Cryptosystems
Block Ciphers and the Advanced Encryption Standard
Substitution-Permutation Networks
Linear Cryptanalysis
The Piling-up Lemma
Linear Approximations of S-boxes
A Linear Attack on an SPN
Differential Cryptanalysis
The Data Encryption Standard
Description of DES
Analysis of DES
The Advanced Encryption Standard
Description of AES
Analysis of AES
Modes of Operation
Notes and References
Cryptographic Hash Functions
Hash Functions and Data Integrity
Security of Hash Functions
The Random Oracle Model
Algorithms in the Random Oracle Model
Comparison of Security Criteria
Iterated Hash Functions
The Merkle-Damgard Construction
The Secure Hash Algorithm
Message Authentication Codes
Nested MACs and HMAC
CBC-MAC and Authenticated Encryption
Unconditionally Secure MACs
Strongly Universal Hash Families
Optimality of Deception Probabilities
Notes and References
The RSA Cryptosystem and Factoring Integers
Introduction to Public-key Cryptography
More Number Theory
The Euclidean Algorithm
The Chinese Remainder Theorem
Other Useful Facts
The RSA Cryptosystem
Implementing RSA
Primality Testing
Legendre and Jacobi Symbols
The Solovay-Strassen Algorithm
The Miller-Rabin Algorithm
Square Roots Modulo n
Factoring Algorithms
The Pollard p - 1 Algorithm
The Pollard Rho Algorithm
Dixon's Random Squares Algorithm
Factoring Algorithms in Practice
Other Attacks on RSA
Computing [phi] (n)
The Decryption Exponent
Wiener's Low Decryption Exponent Attack
The Rabin Cryptosystem
Security of the Rabin Cryptosystem
Semantic Security of RSA
Partial Information Concerning Plaintext Bits
Optimal Asymmetric Encryption Padding
Notes and References
Public-key Cryptography and Discrete Logarithms
The ElGamal Cryptosystem
Algorithms for the Discrete Logarithm Problem
Shanks' Algorithm
The Pollard Rho Discrete Logarithm Algorithm
The Pohlig-Hellman Algorithm
The Index Calculus Method
Lower Bounds on the Complexity of Generic Algorithms
Finite Fields
Elliptic Curves
Elliptic Curves over the Reals
Elliptic Curves Modulo a Prime
Properties of Elliptic Curves
Point Compression and the ECIES
Computing Point Multiples on Elliptic Curves
Discrete Logarithm Algorithms in Practice
Security of ElGamal Systems
Bit Security of Discrete Logarithms
Semantic Security of ElGamal Systems
The Diffie-Hellman Problems
Notes and References
Signature Schemes
Security Requirements for Signature Schemes
Signatures and Hash Functions
The ElGamal Signature Scheme
Security of the ElGamal Signature Scheme
Variants of the ElGamal Signature Scheme
The Schnorr Signature Scheme
The Digital Signature Algorithm
The Elliptic Curve DSA
Provably Secure Signature Schemes
One-time Signatures
Full Domain Hash
Undeniable Signatures
Fail-stop Signatures
Notes and References
Pseudo-random Number Generation
Introduction and Examples
Indistinguishability of Probability Distributions
Next Bit Predictors
The Blum-Blum-Shub Generator
Security of the BBS Generator
Probabilistic Encryption
Notes and References
Identification Schemes and Entity Authentication
Challenge-and-Response in the Secret-key Setting
Attack Model and Adversarial Goals
Mutual Authentication
Challenge-and-Response in the Public-key Setting
Public-key Identification Schemes
The Schnorr Identification Scheme
Security of the Schnorr Identification Scheme
The Okamoto Identification Scheme
The Guillou-Quisquater Identification Scheme
Identity-based Identification Schemes
Notes and References
Key Distribution
Diffie-Hellman Key Predistribution
Unconditionally Secure Key Predistribution
The Blom Key Predistribution Scheme
Key Distribution Patterns
Fiat-Naor Key Distribution Patterns
Mitchell-Piper Key Distribution Patterns
Session Key Distribution Schemes
The Needham-Schroeder Scheme
The Denning-Sacco Attack on the NS Scheme
The Bellare-Rogaway Scheme
Notes and References
Key Agreement Schemes
Diffie-Hellman Key Agreement
The Station-to-station Key Agreement Scheme
Security of STS
Known Session Key Attacks
MTI Key Agreement Schemes
Known Session Key Attacks on MTI/A0
Key Agreement Using Self-certifying Keys
Encrypted Key Exchange
Conference Key Agreement Schemes
Notes and References
Public-key Infrastructure
Introduction: What is a PKI?
A Practical Protocol: Secure Socket Layer
Certificate Life-cycle Management
Trust Models
Strict Hierarchy Model
Networked PKIs
The Web Browser Model
Pretty Good Privacy
The Future of PKI?
Alternatives to PKI
Identity-based Cryptography
The Cocks Identity-based Encryption Scheme
Notes and References
Secret Sharing Schemes
Introduction: The Shamir Threshold Scheme
A Simplified (t, t)-threshold Scheme
Access Structures and General Secret Sharing
The Monotone Circuit Construction
Formal Definitions
Information Rate and Construction of Efficient Schemes
The Vector Space Construction
An Upper Bound on the Information Rate
The Decomposition Construction
Notes and References
Multicast Security and Copyright Protection
Introduction to Multicast Security
Broadcast Encryption
An Improvement using Ramp Schemes
Multicast Re-keying
The Blacklisting Scheme
The Naor-Pinkas Re-keying Scheme
Logical Key Hierarchy
Copyright Protection
Identifiable Parent Property
2-IPP Codes
Tracing Illegally Redistributed Keys
Notes and References
Further Reading
Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.