2 options
Cryptography : protocols, design and applications / Kamol Lek and Naruemol Rajapakse, editors.
- Format:
- Book
- Series:
- Cryptography, Steganography and Data Security
- Cryptography, steganography and data security
- Privacy and identity protection
- Language:
- English
- Subjects (All):
- Data encryption (Computer science).
- Cryptography.
- Physical Description:
- 1 online resource (254 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Hauppauge, N.Y. : Nova Science Publishers, c2012.
- Language Note:
- English
- Summary:
- Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and electrical engineering. Applications of cryptography include ATM cards, computer passwords, and electrical commerce. In this book, the authors present current research in the study of the protocols, design and application of cryptography. Topics discussed include quantum cryptography protocols and quantum security; visual cryptography for halftone images; mathematical cryptography of the RSA cryptosystem; multi-layer QKD protocol using correlated photon of dark soliton array in a wavelength router and low-cost mutual authentication protocols.
- Contents:
- Intro
- CRYPTOGRAPHY: PROTOCOLS, DESIGN AND APPLICATIONS
- LIBRARY OF CONGRESS CATALOGING-IN-PUBLICATION DATA
- CONTENTS
- PREFACE
- Chapter 1: QUANTUM CRYPTOGRAPHIC PROTOCOLS AND QUANTUM SECURITY
- Abstract
- 1. Introduction
- 1.1. Historical Background
- 1.2. Quantum Information Theory
- 1.3. Emerging Quantum Influences
- 2. Private Communication on the Quantum Channel
- 2.1. The Private Quantum Channel
- 2.2. The Private Capacity of a Quantum Channel
- 2.3. The Non-additivity of Private Information
- 3. Quantum Bit Commitment
- 3.1. History of Quantum Bit Commitment
- 3.2. Description of Quantum Bit Commitment
- 3.3. Security of the Bit Commitment Protocol
- 4. Quantum Oblivious Transfer
- 4.1. History of Quantum Oblivious Transfer
- 5. Quantum Fingerprinting
- 5.1. History of Quantum Fingerprinting
- 5.2. Description of Quantum Fingerprinting
- 6. Quantum Digital Signatures
- 6.1. History of Quantum Digital Signatures
- 6.2. Description of Quantum Digital Signatures
- 7. Quantum Authentication
- 7.1. Description of Quantum Authentication
- 8. Uncloneable Quantum Encryption and QuantumAuthentication
- 8.1. Description of Uncloneable Quantum Encryption
- 8.2. Security of the Uncloneable Quantum Encryption Scheme
- 9. Quantum Secret Sharing
- 9.1. Description of Quantum Secret Sharing
- 9.2. Quantum Protocol for Sharing Classical Information
- 9.3. Quantum Protocol for Sharing Quantum Information
- 10. The Quantum Public Key Scheme
- 10.1. History of Quantum Public Key Scheme
- 10.2. Description of Quantum Public Key Scheme
- 10.3. Security of the Quantum Public Key Protocol
- 10.4. Eve's Attack on the Quantum Public Key Method
- 10.5. Behind the Security of the Quantum Public Key Protocol
- 11. Quantum Money
- 11.1. History of Quantum Money.
- 11.2. Description of Quantum Money
- 11.3. New Models of Quantum Money
- 12. Conclusions
- 13. Further Reading
- Author Biographies
- References
- Chapter 2: LOW-COST MUTUAL AUTHENTICATION PROTOCOLS
- Introduction
- Lightweight Mutual Authentication Protocols
- The Karthikeyan and Nesterenko Protocol
- The Duc et al. Protocol
- The Chien and Chen Protocol
- The Li et al. Protocol
- The Chien and Huang Protocol
- The Chen and Deng Protocol
- The Qingling et al. Protocol
- The Sun and Ting Protocol
- Ultralightweight Mutual Authentication Protocols
- The M2AP, EMAP, and LMAP Protocols
- The Strong Authentication and Strong Integrity (SASI) Protocol
- The Gossamer Protocol
- Associated Protocols
- Summary
- Chapter 3: A HIGHLY EFFICIENT VISUAL CRYPTOGRAPHY FOR HALFTONE IMAGES
- 2. Related Works
- 2.1. (2, 2) VSSM Schemes
- 2.2. (k, n)-m-VSSM Schemes
- 3. Encryption Algorithm
- 3.1. (2, 2)-2-VSSM Schemes
- 3.2. Refine the Recovered Images
- 4. Implementation Results and Security Analysis
- 4.1. Performance Evaluations
- 4.2. Security Analysis
- 4.3. Comparison with Previous Approach
- 5. Conclusion
- Chapter 4: MULTI LAYER QKD PROTOCOL USING CORRELATED PHOTON OF DARK SOLITON ARRAY IN A WAVELENGTH ROUTER
- 2. Dark Soliton Array Generation
- 3. Multi Layers Quantum Router
- 4. Proposed Protocol
- 4. Discussion
- 4. Conclusion
- Chapter 5: CHAOS-BASED CRYPTOSYSTEM IN DIFFERENT MODES OF BLOCK ENCRYPTION
- 2. Objective of the Chapter
- 3. Proposed Encryption Algorithm
- 3.1. Design of the Cryptosystem Using the CBC Mode
- 3.2. Design of the Cryptosystem Using the CFB Mode
- 3.3. Design of the Cryptosystem Using the OFB Mode.
- 4. Security and Performance Evaluation of the Cryptosystem
- 4.1. Encryption and Decryption Speed
- 4.2. Key Sensitivity
- 4.3. Resistance to Brute Force Attack
- 4.4. Resistance to Classical Attacks
- Chapter 6: THE MATHEMATICAL CRYPTOGRAPHY OF THERSA CRYPTOSYSTEM
- 2. The Mathematics of the RSA Cryptosystem
- 2.1. The Basic Mathematics
- 2.2. The Basic RSA Cryptosystem
- 2.3. Elementary Attacks on RSA
- 3. Diophantine Approximations
- 3.1. Continued Fractions
- 3.2. Attacks on RSA Using Continued Fractions
- 4. Lattices
- 4.1. Lattices Preliminaries and the LLL Algorithm
- 4.2. Attacks on RSA Using Lattice Reduction
- Chapter 7: QUANTUM SECURE COMMUNICATION
- 2. Some Techniques of Classical Cryptography
- 2.1. Historical Brief
- 2.2. Cryptography Algorithms
- 3. Quantum Cryptography
- 3.1. BB84 Protocol
- 3.2. EPR Protocol &
- B92 Protocol
- 4. Other Protocols
- 4.1. Quantum Communication Using Discrete Variables
- 4.2. DSQC with Quantum Teleportation and Entanglement Swapping
- 4.3. Quantum Communication via Continuous Variable
- Chapter 8: SECURITY RISK MEASURING AND FORECASTING
- 2. A Game-Theoretic View on Security
- 2.1. Elements of Game-Theory
- 2.2. Risk Estimates from Zero-Sum Competitions
- 3. Modeling
- 3.1. Modeling: The General Case
- 3.2. Refining the Model
- 4. Risk Forecasting
- 4.1. Bayesian Updating
- 4.2. Forecasting: The Univariate Case
- 4.3. Forecasting: The Multivariate Case
- INDEX.
- Notes:
- Description based upon print version of record.
- Includes bibliographic references and index.
- Description based on print version record.
- ISBN:
- 1-62100-831-2
- OCLC:
- 831676496
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.