Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A classical introduction to cryptography : applications for communications security
Vaudenay S., Springer-Verlag New York, Inc., Secaucus, NJ, 2005. 335 pp. Type: Book (9780387254647)
Date Reviewed: May 10 2006

This book introduces the basic concepts of information and communication security by providing the appropriate mathematical elements to prove or break the security of cryptographic schemes. It is the transcript of a course held by the author at the Communication Systems Division of the ¿cole Polytechnique F¿d¿rale de Lausanne. It covers the main topics of cryptology, including symmetric and public-key cryptography, cryptographic protocols, design, cryptanalysis, and implementation of cryptosystems.

The book contains 12 chapters: The first, “Prehistory of Cryptography,” treats the foundations of conventional cryptography and the Shannon concepts regarding secrecy. Chapter 2, “Conventional Cryptography,” considers the main symmetric cryptographic protocols--data encryption standard (DES) and advanced encryption standard (AES); DES modes of operation; some applications (like Unix passwords); stream ciphers; and some basic types of attacks (such as brute force and meet-in-the-middle attacks). Chapter 3 is dedicated to some conventional cryptographic primitives that assure the integrity, authentication, and randomness of messages (hashing, message authentication code, and pseudorandom generators).

Chapter 4 investigates the main attack methods against symmetric cryptographic protocols: linear and differential cryptanalysis, security models, and Markov ciphers. It also considers some ways to strengthen security and to estimate the resistance against attacks. Chapter 5 presents several security protocols that use conventional cryptography: passwords, challenge-response protocols, one-time passwords, key distribution, authentication chains, and wireless communication (the global system for mobile communications (GSM) and the Bluetooth networks).

Chapters 6, 7, and 8 cover the mathematical background used in the construction and analysis of cryptographic schemes: linear algebra (including elliptic curves over finite fields), number theory (primality and factorization and the discrete logarithm problem), and some elements of complexity theory (with a sketch of Turing machines). Unfortunately, the mathematics of probabilities and statistics are poorly covered in this book.

Chapter 9 continues the presentation of cryptographic protocols with public key cryptography; the main schemes are presented, including Diffie-Hellman, RSA, and El Gamal. Unfortunately, nothing about elliptic curve cryptographic algorithms is mentioned. Chapter 10 is dedicated to digital signature schemes. Chapter 11 describes other cryptographic protocols. It provides a summary introduction to zero knowledge and secret sharing schemes. Some special digital signatures are also considered. The last chapter provides a bridge between cryptography and communication security. Some known examples of cryptographic applications (certificates, secure sockets layer, secure shell, and pretty good privacy protocols) are presented.

Each chapter contains a section with exercises that do not require an extensive background in mathematics, since the most important notions are introduced and discussed in many of the exercises. This book is designed for upper-level undergraduate and graduate-level students in computer science. It is also suitable for researchers and practitioners in industry.

Reviewer:  Adrian Atanasiu Review #: CR132760 (0703-0223)
Bookmark and Share
  Reviewer Selected
 
 
Public Key Cryptosystems (E.3 ... )
 
 
Cryptographic Controls (D.4.6 ... )
 
 
Network Communication (D.4.4 ... )
 
 
Security, Integrity, And Protection (H.2.7 ... )
 
 
Communications Management (D.4.4 )
 
 
Database Administration (H.2.7 )
 
  more  
Would you recommend this review?
yes
no
Other reviews under "Public Key Cryptosystems": Date
Direct demonstration of the power to break public-key cryptosystems
Koyama K.  Advances in cryptology (, Sydney, Australia, Jan 8-11, 1990)211990. Type: Proceedings
Sep 1 1991
Public-key cryptography
Salomaa A., Springer-Verlag New York, Inc., New York, NY, 1990. Type: Book (9783540528319)
Feb 1 1992
Computation of discrete logarithms in prime fields
LaMacchia B., Odlyzko A. Designs, Codes and Cryptography 1(1): 47-62, 1991. Type: Article
Apr 1 1992
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy