## Basic Methods of CryptographyThis text covers the fundamentals of cryptography, the means of establishiing security in the storage and transportation of information. With the proliferation of computer use in business, information is being communicated and processed automatically on a large scale. Medical and financial files, automatic banking, video-phones, pay-tv, facsimiles, tele-shopping, and global computer networks all process highly sensitive information. There is a growing need for the protection of information to safeguard economic interests, to prevent fraud, and to ensure privacy. In this book, the author describes the fundamentals of secure storage and transportation of information. Van der Lubbe pays particular attention to symmetric (DES) and asymmetric (RSA) cryptographic algorithms, to methods for authentication, data integrity and digital signatures, key management, and to network aspects. The book will be of value to advanced students and researchers involved in data protection and information processing, including electrical engineers, mathematicians, business managers, system designers, application programmers, information analysts and security officers. |

### What people are saying - Write a review

User Review - Flag as inappropriate

An Excellent book on cryptography and cryptanalysis

### Contents

INTRODUCTION TO CRYPTOLOGY | 1 |

12 Aspects of security | 3 |

13 Cryptanalytic attacks | 7 |

CLASSICAL CIPHER SYSTEMS | 10 |

22 Transposition ciphers | 11 |

23 Substitution ciphers | 14 |

24 The Hagelin machine | 18 |

25 Statistics and cryptanalysis | 25 |

55 The generating function | 114 |

56 Cryptanalysis of LFSRs | 119 |

57 Nonlinear shift registers | 124 |

PUBLIC KEY SYSTEMS | 131 |

62 The RSA system | 132 |

63 The knapsack system | 143 |

64 Cracking the knapsack system | 147 |

65 Public key systems based on elliptic curves | 152 |

THE INFORMATION THEORETICAL APPROACH | 37 |

32 The information measure and absolute security | 38 |

33 The unicity distance | 44 |

34 Error probability and security | 48 |

35 Practical security | 58 |

THE DATA ENCRYPTION STANDARD | 60 |

42 Characteristics of the DBS | 72 |

43 Alternative descriptions | 77 |

44 Analysis of the DES | 83 |

45 The modes of DES | 87 |

46 Future of the DES | 93 |

47 IDEA International Data Encryption Algorithm | 95 |

SHIFT REGISTERS | 98 |

52 The theory of finite state machines | 100 |

53 Shift registers | 102 |

54 Random properties of shift register sequences | 106 |

AUTHENTICATION AND INTEGRITY | 158 |

72 Message integrity with the aid of Hash functions | 163 |

73 Entity authentication with symmetrical algorithm | 169 |

74 Message authentication with a message authentication code MAC | 173 |

75 Message authentication with digital signatures | 174 |

76 Zeroknowledge techniques | 181 |

KEY MANAGEMENT AND NETWORK SECURITY | 191 |

82 Key distribution for asymmetrical systems | 194 |

83 Key distribution for symmetrical algorithms | 196 |

84 Network security | 199 |

85 Fair cryptosystems | 202 |

SHANNONS INFORMATION MEASURE | 207 |

ENCIPHERMENT OF IMAGERY | 212 |

219 | |

226 | |

### Other editions - View all

### Common terms and phrases

64 bits A B C D Alice alphabet assume binary blocks calculate CD A B characteristic polynomial cipher system ciphertext code wheels columns Consider corresponding cryptanalyst cryptographic cryptographic algorithms D A B C deciphered decipherment decrypted denoted digital signatures elements elliptic curve enciphered encipherment encrypted equal error probability example expansion operation feedback function Figure given Hash function information measure initial permutation input bits instance intruder key equivocation key management knapsack length letters LFSR matrix method MN(s mod q modulo number of possible number of sections one-way function output bits output sequence pixels plaintext polyalphabetical substitution prime number primitive polynomial protocol public key public key systems random number residual classes RSA system S-box secret key shift register so-called subkeys substitution cipher super-increasing sequence symbols Table Theorem total number transposition cipher unicity distance vector Ź Ź Ź zeros