Cryptography Reference
In-Depth Information
and trade shows 18 one can attend to learn more about products that implement
cryptographic techniques, mechanisms, and services. The major goal of this topic
is to provide some basic understanding for what is currently going on. If you want
to learn more about the practical use of cryptography to secure Internet and WWW
applications, you may refer to [29-31] or any other topic about Internet and Web
security. 19 These practical applications of cryptography are not addressed (repeated)
in this topic.
1.4
OUTLINE OF THE Topic
The rest of this topic is organized as follows:
In Chapter 2, Cryptographic Systems , we introduce, briefly overview, and
put into perspective the three classes of cryptographic systems (i.e., unkeyed
cryptosystems, secret key cryptosystems, and public key cryptosystems) and
some major representatives.
In Chapter 3, Discrete Mathematics , we begin the part on mathematical
fundamentals (i.e., Part I) by discussing the aspects of discrete mathematics
that are relevant for contemporary cryptography.
In Chapter 4, Probability Theory , we elaborate on probability theory as far as
it is relevant for contemporary cryptography.
In Chapter 5, Information Theory , we use probability theory to quantify
information and to introduce the aspects of information theory that are used
in contemporary cryptography.
In Chapter 6, Complexity Theory , we provide a brief introduction to complex-
ity theory as far as it is relevant for contemporary cryptography.
In Chapter 7, One-Way Functions , we begin the part on unkeyed cryptosys-
tems (i.e., Part II) by elaborating on one-way functions and discussing some
candidate one-way functions that are frequently used in cryptography.
In Chapter 8, Cryptographic Hash Functions , we overview and discuss cryp-
tographic hash functions and their use in contemporary cryptography.
In Chapter 9, Random Bit Generators , we elaborate on random bit generators
and discuss some possible realizations and implementations.
18
The most important trade show is the RSA Conference held annually in ths United States, Europe,
and Asia. Refer to http://www.rsaconference.com for more information.
19
http://www.esecurity.ch/bookstore.html
Search WWH ::




Custom Search