Cryptography: Theory and Practice (Chapman & Hall/CRC Cryptography and Network Security Series)
<P>Through three editions, <B><I>Cryptography: Theory and Practice</B></I>, has been embraced by instructors and students alike. It offers a comprehensive primer for the subject’s fundamentals while presenting the most current advances in cryptography.</P> <P>The authors offer comprehensive, in-depth treatment of the methods and protocols that are vital to safeguarding the seemingly infinite and increasing amount of information circulating around the world.</P> <P><B>Key Features of the Fourth Edition:</P> <UL></B> <P> <LI>New chapter on the exciting, emerging new area of post-quantum cryptography (Chapter 9).</LI> <P></P> <P> <LI>New high-level, nontechnical overview of the goals and tools of cryptography (Chapter 1).</LI> <P></P> <P> <LI>New mathematical appendix that summarizes definitions and main results on number theory and algebra (Appendix A).</LI> <P></P> <P> <LI>An expanded treatment of stream ciphers, including common design techniques along with coverage of Trivium.</LI> <P></P> <P> <LI>Interesting attacks on cryptosystems, including:</LI> <P></P> <UL> <P> <LI>padding oracle attack</LI> <P></P> <P> <LI>correlation attacks and algebraic attacks on stream ciphers</LI> <P></P> <P> <LI>attack on the DUAL-EC random bit generator that makes use of a trapdoor.</LI> <P></P></UL> <P> <LI>A treatment of the sponge construction for hash functions and its use in the new SHA-3 hash standard.</LI> <P></P> <P> <LI>Methods of key distribution in sensor networks.</LI> <P></P> <P> <LI>The basics of visual cryptography, allowing a secure method to split a secret visual message into pieces (shares) that can later be combined to reconstruct the secret.</LI> <P></P> <P> <LI>The fundamental techniques cryptocurrencies, as used in Bitcoin and blockchain.</LI> <P></P> <P> <LI>The basics of the new methods employed in messaging protocols such as Signal, including deniability and Diffie-Hellman key ratcheting.</LI> <P></P></UL>