Understanding Cryptography

A Textbook for Students and Practitioners

  • Christof Paar
  • Jan Pelzl

Table of contents

  1. Front Matter
    Pages i-xviii
  2. Christof Paar, Jan Pelzl
    Pages 1-27
  3. Christof Paar, Jan Pelzl
    Pages 29-54
  4. Christof Paar, Jan Pelzl
    Pages 55-86
  5. Christof Paar, Jan Pelzl
    Pages 87-121
  6. Christof Paar, Jan Pelzl
    Pages 123-148
  7. Christof Paar, Jan Pelzl
    Pages 149-171
  8. Christof Paar, Jan Pelzl
    Pages 173-204
  9. Christof Paar, Jan Pelzl
    Pages 239-257
  10. Christof Paar, Jan Pelzl
    Pages 259-292
  11. Christof Paar, Jan Pelzl
    Pages 293-317
  12. Christof Paar, Jan Pelzl
    Pages 319-330
  13. Christof Paar, Jan Pelzl
    Pages 331-357
  14. Back Matter
    Pages 359-372

About this book

Introduction

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.

After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.

The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book’s website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Keywords

AES Applied cryptography Crib Cryptography Cryptology DES Data security Hash functions Key establishment Lightweight ciphers Message Authentication Code Public-key infrastructure (PKI) RFID ants hash function

Authors and affiliations

  • Christof Paar
    • 1
  • Jan Pelzl
    • 2
  1. 1.Fak. Elektrotechnik und, InformationstechnikUniversität BochumBochumGermany
  2. 2.Fak. Elektrotechnik und, InformationstechnikUniversität BochumBochumGermany

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-642-04101-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2010
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-44649-8
  • Online ISBN 978-3-642-04101-3
  • About this book