Complexity and cryptography: an introduction
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Buch |
Sprache: | Englisch |
Veröffentlicht: |
Cambridge [u.a.]
Cambridge Univ. Press
2006
|
Ausgabe: | 1. publ. |
Schlagwörter: | |
Links: | http://www3.ub.tu-berlin.de/ihv/001718567.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014743805&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
Umfang: | XII, 292 S. graph. Darst. |
ISBN: | 0521617715 9780521617710 0521852315 9780521852319 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV021527399 | ||
003 | DE-604 | ||
005 | 20060608 | ||
007 | t| | ||
008 | 060327s2006 xx d||| |||| 00||| eng d | ||
020 | |a 0521617715 |9 0-521-61771-5 | ||
020 | |a 9780521617710 |9 978-0-521-61771-0 | ||
020 | |a 0521852315 |9 0-521-85231-5 | ||
020 | |a 9780521852319 |9 978-0-521-85231-9 | ||
035 | |a (OCoLC)61757130 | ||
035 | |a (DE-599)BVBBV021527399 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-824 |a DE-91G |a DE-473 |a DE-83 |a DE-11 |a DE-188 |a DE-634 | ||
050 | 0 | |a Z103 | |
082 | 0 | |a 005.82 |2 22 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a DAT 517f |2 stub | ||
100 | 1 | |a Talbot, John |e Verfasser |4 aut | |
245 | 1 | 0 | |a Complexity and cryptography |b an introduction |c John Talbot ; Dominic Welsh |
250 | |a 1. publ. | ||
264 | 1 | |a Cambridge [u.a.] |b Cambridge Univ. Press |c 2006 | |
300 | |a XII, 292 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Complexité de calcul (Informatique) | |
650 | 4 | |a Cryptographie | |
650 | 4 | |a Computational complexity | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Komplexität |0 (DE-588)4135369-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Komplexität |0 (DE-588)4135369-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Welsh, Dominic J. A. |e Verfasser |4 aut | |
856 | 4 | |u http://www3.ub.tu-berlin.de/ihv/001718567.pdf |3 Inhaltsverzeichnis | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014743805&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014743805 |
Datensatz im Suchindex
DE-BY-TUM_call_number | 0102 DAT 517f 2006 A 5021 |
---|---|
DE-BY-TUM_katkey | 1547101 |
DE-BY-TUM_location | 01 |
DE-BY-TUM_media_number | 040020294888 |
_version_ | 1821934137396690945 |
adam_text | Contents
Preface page ix
Notation xi
1 Basics of cryptography 1
1.1 Cryptographic models 2
1.2 A basic scenario: cryptosystems 3
1.3 Classical cryptography 7
1.4 Modern cryptography 8
2 Complexity theory 10
2.1 What is complexity theory? 10
2.2 Deterministic Turing machines 16
2.3 Decision problems and languages 22
2.4 Complexity of functions 30
2.5 Space complexity 33
3 Non deterministic computation 39
3.1 Non deterministic polynomial time NP 39
3.2 Polynomial time reductions 43
3.3 NP completeness 45
3.4 Turing reductions and NP hardness 54
3.5 Complements of languages in NP 56
3.6 Containments between complexity classes 60
3.7 NP revisited non deterministic Turing machines 62
4 Probabilistic computation 67
4.1 Can tossing coins help? 67
4.2 Probabilistic Turing machines and RP 71
v
vi Contents
4.3 Primality testing 74
4.4 Zero error probabilistic polynomial time 80
4.5 Bounded error probabilistic polynomial time 81
4.6 Non uniform polynomial time 83
4.7 Circuits 86
4.8 Probabilistic circuits 92
4.9 The circuit complexity of most functions 93
4.10 Hardness results 94
5 Symmetric cryptosystems 99
5.1 Introduction 99
5.2 The one time pad: Vernam s cryptosystem 101
5.3 Perfect secrecy 102
5.4 Linear shift register sequences 106
5.5 Linear complexity 111
5.6 Non linear combination generators 113
5.7 Block ciphers and DES 115
5.8 Rijndael and the AES 118
5.9 The Pohlig Hellman cryptosystem 119
6 One way functions 125
6.1 In search of a definition 125
6.2 Strong one way functions 129
6.3 One way functions and complexity theory 132
6.4 Weak one way functions 135
7 Public key cryptography 141
7.1 Non secret encryption 141
7.2 The Cocks Ellis non secret cryptosystem 142
7.3 The RSA cryptosystem 145
7.4 The Elgamal public key cryptosystem 147
7.5 Public key cryptosystems as trapdoor functions 150
7.6 Insecurities in RSA 153
7.7 Finding the RSA private key and factoring 155
7.8 Rabin s public key cryptosystem 158
7.9 Public key systems based on NP hard problems 161
7.10 Problems with trapdoor systems 164
8 Digital signatures 170
8.1 Introduction 170
8.2 Public key based signature schemes 171
Contents vii
8.3 Attacks and security of signature
schemes 172
8.4 Signatures with privacy 176
8.5 The importance of hashing 178
8.6 The birthday attack 180
9 Key establishment protocols 187
9.1 The basic problems 187
9.2 Key distribution with secure channels 188
9.3 Diffie Hellman key establishment 190
9.4 Authenticated key distribution 193
9.5 Secret sharing 196
9.6 Shamir s secret sharing scheme 197
10 Secure encryption 203
10.1 Introduction 203
10.2 Pseudorandom generators 204
10.3 Hard and easy bits of one way functions 207
10.4 Pseudorandom generators from hard core
predicates 211
10.5 Probabilistic encryption 216
10.6 Efficient probabilistic encryption 221
11 Identification schemes 229
11.1 Introduction 229
11.2 Interactive proofs 231
11.3 Zero knowledge 235
11.4 Perfect zero knowledge proofs 236
11.5 Computational zero knowledge 240
11.6 The Fiat Shamir identification scheme 246
Appendix 1 Basic mathematical background 250
A 1.1 Order notation 250
A 1.2 Inequalities 250
Appendix 2 Graph theory definitions 252
Appendix 3 Algebra and number theory 253
A3.1 Polynomials 253
A3.2 Groups 253
A3.3 Number theory 254
viii Contents
Appendix 4 Probability theory 257
Appendix 5 Hints to selected exercises and problems 261
Appendix 6 Answers to selected exercises and problems 268
Bibliography 278
Index 287
|
any_adam_object | 1 |
author | Talbot, John Welsh, Dominic J. A. |
author_facet | Talbot, John Welsh, Dominic J. A. |
author_role | aut aut |
author_sort | Talbot, John |
author_variant | j t jt d j a w dja djaw |
building | Verbundindex |
bvnumber | BV021527399 |
callnumber-first | Z - Library Science |
callnumber-label | Z103 |
callnumber-raw | Z103 |
callnumber-search | Z103 |
callnumber-sort | Z 3103 |
callnumber-subject | Z - Books and Writing |
classification_rvk | SK 170 ST 276 |
classification_tum | DAT 465f DAT 517f |
ctrlnum | (OCoLC)61757130 (DE-599)BVBBV021527399 |
dewey-full | 005.82 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.82 |
dewey-search | 005.82 |
dewey-sort | 15.82 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik Mathematik |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01942nam a2200517 c 4500</leader><controlfield tag="001">BV021527399</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060608 </controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">060327s2006 xx d||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0521617715</subfield><subfield code="9">0-521-61771-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521617710</subfield><subfield code="9">978-0-521-61771-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0521852315</subfield><subfield code="9">0-521-85231-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780521852319</subfield><subfield code="9">978-0-521-85231-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)61757130</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021527399</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-634</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">Z103</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 517f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Talbot, John</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Complexity and cryptography</subfield><subfield code="b">an introduction</subfield><subfield code="c">John Talbot ; Dominic Welsh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge [u.a.]</subfield><subfield code="b">Cambridge Univ. Press</subfield><subfield code="c">2006</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 292 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Complexité de calcul (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computational complexity</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Komplexität</subfield><subfield code="0">(DE-588)4135369-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Komplexität</subfield><subfield code="0">(DE-588)4135369-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Welsh, Dominic J. A.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www3.ub.tu-berlin.de/ihv/001718567.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014743805&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014743805</subfield></datafield></record></collection> |
id | DE-604.BV021527399 |
illustrated | Illustrated |
indexdate | 2024-12-20T12:35:42Z |
institution | BVB |
isbn | 0521617715 9780521617710 0521852315 9780521852319 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014743805 |
oclc_num | 61757130 |
open_access_boolean | |
owner | DE-29T DE-824 DE-91G DE-BY-TUM DE-473 DE-BY-UBG DE-83 DE-11 DE-188 DE-634 |
owner_facet | DE-29T DE-824 DE-91G DE-BY-TUM DE-473 DE-BY-UBG DE-83 DE-11 DE-188 DE-634 |
physical | XII, 292 S. graph. Darst. |
publishDate | 2006 |
publishDateSearch | 2006 |
publishDateSort | 2006 |
publisher | Cambridge Univ. Press |
record_format | marc |
spellingShingle | Talbot, John Welsh, Dominic J. A. Complexity and cryptography an introduction Complexité de calcul (Informatique) Cryptographie Computational complexity Cryptography Komplexität (DE-588)4135369-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4135369-9 (DE-588)4033329-2 |
title | Complexity and cryptography an introduction |
title_auth | Complexity and cryptography an introduction |
title_exact_search | Complexity and cryptography an introduction |
title_full | Complexity and cryptography an introduction John Talbot ; Dominic Welsh |
title_fullStr | Complexity and cryptography an introduction John Talbot ; Dominic Welsh |
title_full_unstemmed | Complexity and cryptography an introduction John Talbot ; Dominic Welsh |
title_short | Complexity and cryptography |
title_sort | complexity and cryptography an introduction |
title_sub | an introduction |
topic | Complexité de calcul (Informatique) Cryptographie Computational complexity Cryptography Komplexität (DE-588)4135369-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Complexité de calcul (Informatique) Cryptographie Computational complexity Cryptography Komplexität Kryptologie |
url | http://www3.ub.tu-berlin.de/ihv/001718567.pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014743805&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT talbotjohn complexityandcryptographyanintroduction AT welshdominicja complexityandcryptographyanintroduction |
Inhaltsverzeichnis
Paper/Kapitel scannen lassen
Paper/Kapitel scannen lassen
Teilbibliothek Mathematik & Informatik
Signatur: |
0102 DAT 517f 2006 A 5021 Lageplan |
---|---|
Exemplar 1 | Ausleihbar Am Standort |