My Account Log in

2 options

Cryptography : protocols, design and applications / Kamol Lek and Naruemol Rajapakse, editors.

EBSCOhost Academic eBook Collection (North America) Available online

View online

Ebook Central Academic Complete Available online

View online
Format:
Book
Contributor:
Lek, Kamol.
Rajapakse, Naruemol.
Series:
Cryptography, Steganography and Data Security
Cryptography, steganography and data security
Privacy and identity protection
Language:
English
Subjects (All):
Data encryption (Computer science).
Cryptography.
Physical Description:
1 online resource (254 p.)
Edition:
1st ed.
Place of Publication:
Hauppauge, N.Y. : Nova Science Publishers, c2012.
Language Note:
English
Summary:
Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electrical commerce. In this book, the authors present current research in the study of the protocols, design and application of cryptography. Topics discussed include quantum cryptography protocols and quantum security; visual cryptography for halftone images; mathematical cryptography of the RSA cryptosystem; multi-layer QKD protocol using correlated photon of dark soliton array in a wavelength router and low-cost mutual authentication protocols.
Contents:
Intro
CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS
LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA
CONTENTS
PREFACE
Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY
Abstract
1. Introduction
1.1. Historical Background
1.2. Quantum Information Theory
1.3. Emerging Quantum Influences
2. Private Communication on the Quantum Channel
2.1. The Private Quantum Channel
2.2. The Private Capacity of a Quantum Channel
2.3. The Non-additivity of Private Information
3. Quantum Bit Commitment
3.1. History of Quantum Bit Commitment
3.2. Description of Quantum Bit Commitment
3.3. Security of the Bit Commitment Protocol
4. Quantum Oblivious Transfer
4.1. History of Quantum Oblivious Transfer
5. Quantum Fingerprinting
5.1. History of Quantum Fingerprinting
5.2. Description of Quantum Fingerprinting
6. Quantum Digital Signatures
6.1. History of Quantum Digital Signatures
6.2. Description of Quantum Digital Signatures
7. Quantum Authentication
7.1. Description of Quantum Authentication
8. Uncloneable Quantum Encryption and QuantumAuthentication
8.1. Description of Uncloneable Quantum Encryption
8.2. Security of the Uncloneable Quantum Encryption Scheme
9. Quantum Secret Sharing
9.1. Description of Quantum Secret Sharing
9.2. Quantum Protocol for Sharing Classical Information
9.3. Quantum Protocol for Sharing Quantum Information
10. The Quantum Public Key Scheme
10.1. History of Quantum Public Key Scheme
10.2. Description of Quantum Public Key Scheme
10.3. Security of the Quantum Public Key Protocol
10.4. Eve's Attack on the Quantum Public Key Method
10.5. Behind the Security of the Quantum Public Key Protocol
11. Quantum Money
11.1. History of Quantum Money.
11.2. Description of Quantum Money
11.3. New Models of Quantum Money
12. Conclusions
13. Further Reading
Author Biographies
References
Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS
Introduction
Lightweight Mutual Authentication Protocols
The Karthikeyan and Nesterenko Protocol
The Duc et al. Protocol
The Chien and Chen Protocol
The Li et al. Protocol
The Chien and Huang Protocol
The Chen and Deng Protocol
The Qingling et al. Protocol
The Sun and Ting Protocol
Ultralightweight Mutual Authentication Protocols
The M2AP, EMAP, and LMAP Protocols
The Strong Authentication and Strong Integrity (SASI) Protocol
The Gossamer Protocol
Associated Protocols
Summary
Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES
2. Related Works
2.1. (2, 2) VSSM Schemes
2.2. (k, n)-m-VSSM Schemes
3. Encryption Algorithm
3.1. (2, 2)-2-VSSM Schemes
3.2. Refine the Recovered Images
4. Implementation Results and Security Analysis
4.1. Performance Evaluations
4.2. Security Analysis
4.3. Comparison with Previous Approach
5. Conclusion
Chapter 4: MULTI LAYER QKD PROTOCOL USING CORRELATED PHOTON OF DARK SOLITON ARRAY IN A WAVELENGTH ROUTER
2. Dark Soliton Array Generation
3. Multi Layers Quantum Router
4. Proposed Protocol
4. Discussion
4. Conclusion
Chapter 5: CHAOS-BASED CRYPTOSYSTEM IN DIFFERENT MODES OF BLOCK ENCRYPTION
2. Objective of the Chapter
3. Proposed Encryption Algorithm
3.1. Design of the Cryptosystem Using the CBC Mode
3.2. Design of the Cryptosystem Using the CFB Mode
3.3. Design of the Cryptosystem Using the OFB Mode.
4. Security and Performance Evaluation of the Cryptosystem
4.1. Encryption and Decryption Speed
4.2. Key Sensitivity
4.3. Resistance to Brute Force Attack
4.4. Resistance to Classical Attacks
Chapter 6: THE MATHEMATICAL CRYPTOGRAPHY OF THERSA CRYPTOSYSTEM
2. The Mathematics of the RSA Cryptosystem
2.1. The Basic Mathematics
2.2. The Basic RSA Cryptosystem
2.3. Elementary Attacks on RSA
3. Diophantine Approximations
3.1. Continued Fractions
3.2. Attacks on RSA Using Continued Fractions
4. Lattices
4.1. Lattices Preliminaries and the LLL Algorithm
4.2. Attacks on RSA Using Lattice Reduction
Chapter 7: QUANTUM SECURE COMMUNICATION
2. Some Techniques of Classical Cryptography
2.1. Historical Brief
2.2. Cryptography Algorithms
3. Quantum Cryptography
3.1. BB84 Protocol
3.2. EPR Protocol &amp
B92 Protocol
4. Other Protocols
4.1. Quantum Communication Using Discrete Variables
4.2. DSQC with Quantum Teleportation and Entanglement Swapping
4.3. Quantum Communication via Continuous Variable
Chapter 8: SECURITY RISK MEASURING AND FORECASTING
2. A Game-Theoretic View on Security
2.1. Elements of Game-Theory
2.2. Risk Estimates from Zero-Sum Competitions
3. Modeling
3.1. Modeling: The General Case
3.2. Refining the Model
4. Risk Forecasting
4.1. Bayesian Updating
4.2. Forecasting: The Univariate Case
4.3. Forecasting: The Multivariate Case
INDEX.
Notes:
Description based upon print version of record.
Includes bibliographic references and index.
Description based on print version record.
ISBN:
1-62100-831-2
OCLC:
831676496

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account