Book description
Group theoretic problems have propelled scientific achievements across a wide range of fields, including mathematics, physics, chemistry, and the life sciences. Many cryptographic constructions exploit the computational hardness of group theoretical problems, and the area is viewed as a potential source of quantum-resilient cryptographic primitives for the future.
Group Theoretic Cryptography supplies an ideal introduction to cryptography for those who are interested in group theory and want to learn about the possible interplays between the two fields. Assuming an undergraduate-level understanding of linear algebra and discrete mathematics, it details the specifics of using non-Abelian groups in the field of cryptography.
Moreover, the book evidences how group theoretic techniques help us gain new insight into well known, seemingly unrelated, cryptographic constructions, such as DES.
The book starts with brief overviews of the fundamentals of group theory, complexity theory, and cryptography. Part two is devoted to public-key encryption, including provable security guarantees, public-key encryption in the standard model, and public-key encryption using infinite groups.
The third part of the book covers secret-key encryption. It examines block ciphers, like the Advanced Encryption Standard, and cryptographic hash functions and message authentication codes. The last part delves into a number of cryptographic applications which are nowadays as relevant as encryption—identification protocols, key establishment, and signature schemes are covered.
The book supplies formal security analyses and highlights potential vulnerabilities for cryptographic constructions involving group theory. Summaries and references for further reading, as well as exercises, are included at the end of each chapter. Selected solutions for exercises are provided in the back of the book.
Table of contents
- Cover
- Dedication
- Contents
- List of Figures
- Symbol Description
- Preface
-
Part I: Preliminaries
- Chapter 1: Mathematical background (1/3)
- Chapter 1: Mathematical background (2/3)
- Chapter 1: Mathematical background (3/3)
- Chapter 2: Basics on complexity (1/2)
- Chapter 2: Basics on complexity (2/2)
- Chapter 3: Cryptology: An introduction (1/3)
- Chapter 3: Cryptology: An introduction (2/3)
- Chapter 3: Cryptology: An introduction (3/3)
-
Part II: Public-Key Encryption
- Chapter 4: Provable security guarantees (1/7)
- Chapter 4: Provable security guarantees (2/7)
- Chapter 4: Provable security guarantees (3/7)
- Chapter 4: Provable security guarantees (4/7)
- Chapter 4: Provable security guarantees (5/7)
- Chapter 4: Provable security guarantees (6/7)
- Chapter 4: Provable security guarantees (7/7)
- Chapter 5: Public-key encryption in the standard model (1/5)
- Chapter 5: Public-key encryption in the standard model (2/5)
- Chapter 5: Public-key encryption in the standard model (3/5)
- Chapter 5: Public-key encryption in the standard model (4/5)
- Chapter 5: Public-key encryption in the standard model (5/5)
- Chapter 6: Public-key encryption using infinite groups (1/5)
- Chapter 6: Public-key encryption using infinite groups (2/5)
- Chapter 6: Public-key encryption using infinite groups (3/5)
- Chapter 6: Public-key encryption using infinite groups (4/5)
- Chapter 6: Public-key encryption using infinite groups (5/5)
-
Part III: Secret-Key Encryption
- Chapter 7: Block ciphers (1/5)
- Chapter 7: Block ciphers (2/5)
- Chapter 7: Block ciphers (3/5)
- Chapter 7: Block ciphers (4/5)
- Chapter 7: Block ciphers (5/5)
- Chapter 8: Cryptographic hash functions and message authentication codes (1/3)
- Chapter 8: Cryptographic hash functions and message authentication codes (2/3)
- Chapter 8: Cryptographic hash functions and message authentication codes (3/3)
-
Part IV: Other Cryptographic Constructions
- Chapter 9: Key establishment protocols (1/5)
- Chapter 9: Key establishment protocols (2/5)
- Chapter 9: Key establishment protocols (3/5)
- Chapter 9: Key establishment protocols (4/5)
- Chapter 9: Key establishment protocols (5/5)
- Chapter 10: Signature and identification schemes (1/3)
- Chapter 10: Signature and identification schemes (2/3)
- Chapter 10: Signature and identification schemes (3/3)
- Part V: Appendix
- References (1/4)
- References (2/4)
- References (3/4)
- References (4/4)
Product information
- Title: Group Theoretic Cryptography
- Author(s):
- Release date: April 2015
- Publisher(s): CRC Press
- ISBN: 9781584888376
You might also like
book
Asymmetric Cryptography
Public key cryptography was introduced by Diffie and Hellman in 1976, and it was soon followed …
book
Security of Block Ciphers
A comprehensive evaluation of information security analysis spanning the intersection of cryptanalysis and side-channel analysis Written …
book
Express Learning: Cryptography and Network Security
Express Learning is a series of books designed as quick reference guides to important undergraduate computer …
article
Managing Encryption Keys
This collection of shortcuts provides a practical and concise guide to securing cloud environments. It covers …