The Joy of Cryptography

The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security...

Full description

Saved in:
Bibliographic Details
Main Author: Rosulek, Mike (Author)
Format: Electronic eBook
Language:English
Published: Corvallis, Oregon Oregon State University 2021.
Series:Open textbook library.
Subjects:
Online Access:Access online version
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 OTLid0000897
003 MnU
005 20240122145209.0
006 m o d s
007 cr
008 200722s2017 mnu o 0 0 eng d
040 |a MnU  |b eng  |c MnU 
050 4 |a QA37.3 
245 0 4 |a The Joy of Cryptography  |c Mike Rosulek 
264 2 |a Minneapolis, MN  |b Open Textbook Library 
264 1 |a Corvallis, Oregon  |b Oregon State University  |c 2021. 
264 4 |c ©2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 0 |a Open textbook library. 
505 0 |a 0 Review of Concepts & Notation -- 1 One-Time Pad & Kerckhoffs' Principle -- 2 The Basics of Provable Security -- 3 Secret Sharing -- 4 Basing Cryptography on Intractable Computations -- 5 Pseudorandom Generators -- 6 Pseudorandom Functions & Block Ciphers -- 7 Security Against Chosen Plaintext Attacks -- 8 Block Cipher Modes of Operation -- 9 Chosen Ciphertext Attacks -- 10 Message Authentication Codes -- 11 Hash Functions -- 12 Authenticated Encryption & AEAD -- 13 RSA & Digital Signatures -- 14 Diffie-Hellman Key Agreement -- 15 Public-Key Encryption 
520 0 |a The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4). 
542 1 |f Attribution-NonCommercial-ShareAlike 
546 |a In English. 
588 0 |a Description based on online resource 
650 0 |a Mathematics  |v Textbooks 
650 0 |a Cryptography  |v Textbooks 
700 1 |a Rosulek, Mike  |e author 
710 2 |a Open Textbook Library  |e distributor 
856 4 0 |u https://open.umn.edu/opentextbooks/textbooks/897  |z Access online version