Skip to:Content
|
Bottom
Cover image for Modern cryptology : a tutorial
Title:
Modern cryptology : a tutorial
Personal Author:
Series:
Lecture notes in computer science ; 325
Publication Information:
NY : Springer-Verlag, 1988
ISBN:
9780387968421
Subject Term:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000000581656 Z103.B72 1988 Open Access Book Book
Searching...

On Order

Summary

Summary

Cryptology is the art and science of secure communication over insecure channels. The primary aim of this book is to provide a self-contained overview of recent cryptologic achievements and techniques in a form that can be understood by readers having no previous acquaintance with cryptology. It can thus be used as independent reading by whoever wishes to get started on the subject. An extensive bibliography of 250 references is included to help the reader deepen his or her understanding and go beyond the topics treated here. This book can also be used as preliminary material for an introductory course on cryptology. Despite its simplicity, it covers enough state-of-the-art material to be nevertheless of interest to the specialist. After a survey of the main secret and public key techniques, various applications are discussed. The last chapter describes 'quantum cryptography', a revolutionary approach to cryptography that remains secure even against an opponent with unlimited computingpower. Quantum crytography is based on the principles of quantum physics.


Reviews 1

Choice Review

Cryptology is no longer just the ad hoc business of making and breaking codes. Marriage to computer science has transformed the ancient art in at least two fundamental ways. First, cryptologists can now seek to construct codes that are mathematically secure, at least if various purely mathematical problems, such as factoring large integers, are indeed algorithmically intractable. Second, expanding beyond secret message transmission, cryptologists now study a wide variety of information sharing protocols, motivated perhaps by issues arising in computer security. Ingenious protocols allow one to play poker over the phone with untrusted adversaries, demonstrate knowledge of a password without revealing any part of it, and distribute a secret to, say, ten people so that any seven cooperating could reconstruct the whole but no six together could recover even a part. Each book under review is an excellent introduction. For those with a grounding in theoretical computer science, Modern Cryptology is an exciting, concise overview of recent developments and a guide to the literature. Substantial portions will be accessible even to the general reader; indeed there is required reading here for those concerned about the fate of personal privacy in the computer age. Codes and Cryptography is at once more formal and more elementary. The first half is devoted to the perspective from information theory, which is not emphasized by Brassard; the second half, emphasizing ideas from complexity theory, is comparable to Brassard's book, though not so extensive in its coverage. For a treatment emphasizing connections to number theory, there is N. Koblitz's recent A Course in Number Theory and Cryptography (1987). -D. V. Feldman, University of New Hampshire


Table of Contents

Introduction
Definitions and Classifications
Secret-Key Systems
Public-Key Systems
Applications
Quantum Cryptography
Bibliography
Go to:Top of Page