menu 简单麦麦
account_circle

公钥密码:应用与攻击-Public key cryptography: applications and attacks文件编号:251

已经帮助了2584人找到了他们想要的文件
上传于 2020年2月25日 16:02
3次下载
3100次围观
评分:4.5/5 ★ ★ ★ ★ ★
标题(title):Public key cryptography: applications and attacks
公钥密码:应用与攻击
作者(author):Batten, Lynn Margaret
出版社(publisher):John Wiley & Sons, John Wiley distributor
大小(size):2 MB (2197861 bytes)
格式(extension):epub
注意:如果文件下载完成后为无法打开的格式,请修改后缀名为格式对应后缀

This text covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them
Abstract: This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including ElGamal, RSA, Elliptic Curve, and digital signature schemes. It explains the underlying mathematics needed to build these schemes, and examines the most common techniques used in attacking them.  Read more...
Table of contents :
Content: Preface xii 0 Introduction 1 0.1 The Meaning of the Word Cryptography 2 0.2 Symmetric Key Cryptography 2 0.3 Public Key (Asymmetric) Cryptography 5 0.4 Key Establishment 8 0.5 Cryptography more than just Hiding Secrets 9 0.6 Standards 10 0.7 Attacks 11 1 Congruence Equations 13 1.1 Congruence Arithmetic 13 1.1.1 Computer Examples 17 1.1.2 Problems 18 1.2 The Euclidean Algorithm Finding Inverses 19 1.2.1 Computer Examples 26 1.2.2 Problems 27 1.3 Discrete Logarithms and Diffie-Hellman Key Exchange 27 1.3.1 Computer Examples 34 1.3.2 Problems 35 1.4 Attacking the Discrete Logarithm 37 1.4.1 Computer Examples 45 1.4.2 Problems 46 2 The ElGamal Scheme 49 2.1 Primitive Roots 49 2.1.1 Computer Examples 55 2.1.2 Problems 55 2.2 The ElGamal Scheme 56 2.2.1 Computer Examples 58 2.2.2 Problems 60 2.3 Security of the ElGamal Scheme 62 2.3.1 Computer Examples 64 2.3.2 Problems 64 3 The RSA Scheme 67 3.1 Euler's Theorem 67 3.1.1 Computer Examples 71 3.1.2 Problems 71 3.2 The RSA Algorithm 71 3.2.1 Computer Examples 76 3.2.2 Problems 78 3.3 RSA Security 79 3.3.1 Computer Examples 85 3.3.2 Problems 87 3.4 Implementing RSA 88 3.4.1 Computer Examples 90 3.4.2 Problems 91 4 Elliptic Curve Cryptography 93 4.1 Elliptic Curves and Elliptic Curve Groups 93 4.1.1 Computer Examples 102 4.1.2 Problems 103 4.2 Elliptic Curve Cryptography 104 4.2.1 Computer Examples 109 4.2.2 Problems 112 4.3 The Elliptic Curve Factoring Scheme 113 4.3.1 Computer Examples 115 4.3.2 Problems 116 5 Digital Signatures 117 5.1 Hash Functions 117 5.1.1 Computer Examples 129 5.1.2 Problems 130 5.2 Digital Signature Schemes 132 5.2.1 Computer Examples 139 5.2.2 Problems 141 5.3 Attacks on Digital Signatures 142 5.3.1 Computer Examples 150 5.3.2 Problems 152 6 Primality Testing 155 6.1 Fermat's Approach and Wilson's Theorem 156 6.1.1 Computer Examples 157 6.1.2 Problems 158 6.2 The Miller-Selfridge-Rabin Primality Test 158 6.2.1 Computer Examples 164 6.2.2 Problems 164 6.3 True Primality Tests 165 6.3.1 Computer Examples 168 6.4 Mersenne Primes and the Lucas-Lehmer Test 169 6.4.1 Computer Examples 171 6.4.2 Problems 171 6.5 Primes is in P 171 6.5.1 Computer Examples 175 6.5.2 Problems 176 7 Factoring Methods 179 7.1 Fermat Again 180 7.1.1 Computer Examples 183 7.1.2 Problems 185 7.2 The Quadratic Sieve 185 7.2.1 Computer Examples 187 7.2.2 Problems 189 7.3 Pollard's p - 1 and rho Methods 189 7.3.1 Computer Examples 193 7.3.2 Problems194 7.4 Continued Fractions and Factoring194 7.4.1 Computer Examples 200 7.4.2 Problems 203 Appendix: Solutions to Problems 207 References 231 Index 236 Notation 239

想了解更多信息?可向上传者提问。点击提问
欢迎您上传文件!
费劲心机找到了自己想要的文件?
不如上传简单麦麦!
分享给别人!还能赚取收益
下载须知
1.如有解压密码 提取码都在下面 注意查看
2.如果有问题 可以通过卖家联系方式 联系卖家 如果没有或无法解决可以联系官方客服
3.本文件为公益分享,文件由网上采集而来,如有侵权等问题,请及时联系客服删除

常见问题及官方客服联系方式:点击前往 售后问题处理方式:点击前往
-到底部了哦-
expand_less