Secret History


Book Description

Winner of an Outstanding Academic Title Award from CHOICE Magazine Most available cryptology books primarily focus on either mathematics or history. Breaking this mold, Secret History: The Story of Cryptology gives a thorough yet accessible treatment of both the mathematics and history of cryptology. Requiring minimal mathematical prerequisites, the book presents the mathematics in sufficient detail and weaves the history throughout the chapters. In addition to the fascinating historical and political sides of cryptology, the author—a former Scholar-in-Residence at the U.S. National Security Agency (NSA) Center for Cryptologic History—includes interesting instances of codes and ciphers in crime, literature, music, and art. Following a mainly chronological development of concepts, the book focuses on classical cryptology in the first part. It covers Greek and Viking cryptography, the Vigenère cipher, the one-time pad, transposition ciphers, Jefferson’s cipher wheel, the Playfair cipher, ADFGX, matrix encryption, World War II cipher systems (including a detailed examination of Enigma), and many other classical methods introduced before World War II. The second part of the book examines modern cryptology. The author looks at the work of Claude Shannon and the origin and current status of the NSA, including some of its Suite B algorithms such as elliptic curve cryptography and the Advanced Encryption Standard. He also details the controversy that surrounded the Data Encryption Standard and the early years of public key cryptography. The book not only provides the how-to of the Diffie-Hellman key exchange and RSA algorithm, but also covers many attacks on the latter. Additionally, it discusses Elgamal, digital signatures, PGP, and stream ciphers and explores future directions such as quantum cryptography and DNA computing. With numerous real-world examples and extensive references, this book skillfully balances the historical aspects of cryptology with its mathematical details. It provides readers with a sound foundation in this dynamic field.




Mobile and Wireless Communications


Book Description

Mobile and Wireless Communications presents the latest developments in mobile and wireless research and the industry, with a broad range of topics including: -Ad-hoc networking; -Power control; -Personal communications; -Satellite; -QoS; -UMTS and wireless LANs; -Handoffs, security and mobility; -CDMA and physical layer including modulation and coding; -Methods of communication functions including multiple access, error control, flow control and routing. This state-of-the-art volume comprises the edited proceedings of the Working Conference on Personal Wireless Communications (PWC'2002), which was sponsored by the International Federation for Information Processing (IFIP), organized by IFIP Working Group 6.8, and held in Singapore in October 2002.




Stream Ciphers in Modern Real-time IT Systems


Book Description

This book provides the most complete description, analysis, and comparative studies of modern standardized and most common stream symmetric encryption algorithms, as well as stream modes of symmetric block ciphers. Stream ciphers provide an encryption in almost real-time regardless of the volume and stream bit depth of converted data, which makes them the most popular in modern real-time IT systems. In particular, we analyze the criteria and performance indicators of algorithms, as well as the principles and methods of designing stream ciphers. Nonlinear-feedback shift registers, which are one of the main elements of stream ciphers, have been studied in detail. The book is especially useful for scientists, developers, and experts in the field of cryptology and electronic trust services, as well as for the training of graduate students, masters, and bachelors in the field of information security.




2013 International Conference on Complex Science Management and Education Science


Book Description

2013 International Conference on Complex Science Management and Education Science, will be held in Kunming, China on 23rd-24th Nov. 2013. This conference is sponsored by Advanced Science Research Center, some universities and some Enterprises. 2013 International Conference on Complex Science Management and Education Science (CSMES2013) will provide an excellent international forum for sharing knowledge and results in theory, methodology and applications of Complex Science Management and Education Science . The conference looks for significant contributions to all major fields of the modern Complex Science Management and Education Science in theoretical and practical aspects. The aim of the conference is to provide a platform to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development in the field. 2013 International Conference on Complex Science Management and Education Science (CSMES2013) will be published by DEStech Publications. DEStech will have the CDROM indexed in ISI (Institute of Scientific Information) and Google Book Search. DEStech will submit the CDROM to ISTP and EI for worldwide online citation of qualified papers. We would like to extend our appreciation to all participants in the conference for their great contribution to the success of csmes2013. We would like to thank the keynote and individual speakers and all participating authors for their hard work and time. We also sincerely appreciate technical program committee and all reviewers, whose contributions make this conference possible. Finally, I would like to thank the great support from DEStech Publications, Inc. Prof. Haiyan




Design and Cryptanalysis of ZUC


Book Description

This book is a timely document of state-of-the art analytical techniques in the domain of stream cipher design and analysis with a specific cipher, named ZUC. It links new research to brief contextual literature review in the domain of complex LFSR-based stream ciphers. A snapshot of how stream ciphers are deployed in the mobile telephony architecture, one of the most well-known topics for more than five decades in the domain of computer and communication sciences, is presented in this book. The book provides an in-depth study on design and cryptanalysis of ZUC as well as relevant research results in this field with directions towards future analysis of this cipher.







Proceedings


Book Description




Handbook of Applied Cryptography


Book Description

Cryptography, in particular public-key cryptography, has emerged in the last 20 years as an important discipline that is not only the subject of an enormous amount of research, but provides the foundation for information security in many applications. Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptography It is a valuable source of the latest techniques and algorithms for the serious practitioner It provides an integrated treatment of the field, while still presenting each major topic as a self-contained unit It provides a mathematical treatment to accompany practical discussions It contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussed Now in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.




Recent Trends in Cryptography


Book Description

This volume contains articles representing the courses given at the 2005 RSME Santalo Summer School on ``Recent Trends in Cryptography''. The main goal of the Summer School was to present some of the recent mathematical methods used in cryptography and cryptanalysis. The School was oriented to graduate and doctoral students, as well as recent doctorates. The material is presented in an expository manner with many examples and references. The topics in this volume cover some of the most interesting new developments in public key and symmetric key cryptography, such as pairing based cryptography and lattice based cryptanalysis.