Get Moderne Verfahren der Kryptographie. Von RSA zu PDF

By Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter

Die Entwicklung und examine von Protokollen wird ein immer wichtigerer Zweig der modernen Kryptologie. Große Berühmtheit erlangt haben die so genannten "Zero-Knowledge-Protokolle", mit denen es gelingt, einen anderen von der Existenz eines Geheimnisses zu überzeugen, ohne ihm das Geringste zu verraten.

Show description

Read or Download Moderne Verfahren der Kryptographie. Von RSA zu Zero-Knowledge PDF

Best cryptography books

Download e-book for iPad: Multimedia Encryption and Watermarking by Borko Furht, Edin Muharemagic, Daniel Socek

Multimedia Encryption and Watermarking offers a complete survey of latest multimedia encryption and watermarking recommendations, which permit a safe trade of multimedia highbrow estate. half I, electronic Rights administration (DRM) for Multimedia, introduces DRM options and types for multimedia content material security, and offers the main gamers.

Download e-book for kindle: The Information Security Dictionary Defining The Terms That by Urs E. Gattiker

Anything for everybody If this ebook is to be successful and support readers, its cardinal advantage has to be to supply an easy reference textual content. it's going to be an important addition to a data safeguard library. As such it may additionally serve the aim of being a brief refresher for phrases the reader has no longer noticeable because the days while one attended a computing technological know-how software, info defense path or workshop.

Public Key Cryptography - PKC 2010: 13th International by Phong Q. Nguyen, David Pointcheval PDF

This publication constitutes the refereed complaints of the thirteenth foreign convention on perform and idea in Public Key Cryptography, PKC 2010, held in Paris, France, in might 2010. The 29 revised complete papers provided have been rigorously reviewed and chosen from a hundred forty five submissions. The papers are equipped in topical sections on encryption; cryptanalysis; protocols; community coding; instruments; elliptic curves; lossy trapdoor features; discrete logarithm; and signatures.

Post-Quantum Cryptography - download pdf or read online

Quantum pcs will holiday present day most well-liked public-key cryptographic structures, together with RSA, DSA, and ECDSA. This ebook introduces the reader to the following iteration of cryptographic algorithms, the platforms that withstand quantum-computer assaults: specifically, post-quantum public-key encryption platforms and post-quantum public-key signature platforms.

Extra resources for Moderne Verfahren der Kryptographie. Von RSA zu Zero-Knowledge

Sample text

According to Proposition 5, uτ v implies uτ ′ v. If char GF (q) is an odd number, the converse of the last proposition is true [62]. 5. Existence of free triangular optimal folders Proposition 6. Let q be an odd number. , τ = τ ′ and EQ(q) = CD(q) (EQ(k, q) = CD(k, q)). The condition charGF (q) = 2 in the last proposition is essential. For instance, the graph EQ(k, 4)), k > 3, contains 2 isomorphic connected components. Clearly EQ(k, 2) is a union of cycles CD(k, 2). Thus neither EQ(k, 2) nor CD(k, 2) is an interesting family of graphs of high girth.

Time evaluation of the private key encryption for Alice We have implemented computer application [54], which uses family of graphs RDE(n, K) for private key cryptography. To achieve high speed property, commutative ring K = Z2k , k ∈ {8, 16, 32}, with operations +, × modulo 2k . Parameter n stands for the length of plaintext (input data) and the length of ciphertext. We mark by G1 the algorithm with k = 8, by G2 the algorithm with k = 16, and by G4 the algorithm with k = 32. So Gi, i ∈ 1, 2, 4 denotes the number of bytes used in the alphabet (and the size of 1 character in the string).

Ln , . ] and (p) = (p1 , p3 , . . , pn , . ) (line and point in ”natural coordinates”). Let ηi be the map ”deleting all coordinates with numbers > i” from D(q) to D(i, q), and ηi,j be map ”deleting all coordinates with numbers > i ” from D(j, q), j > i into D(i, q). The following statement follows directly from the definitions: Proposition 4. (see, [57], [59]) D(i, q), ηi,j is a free triangular linguistic folder over GF (q). It has a forest D(q) as a cover. Example 5. Let k ≥ 6, t = [(k + 2)/4], and let u = (ui , u11 , · · · , utt , u′tt , ut,t+1 , ut+1,t , · · · ) be a vertex of D(k, q).

Download PDF sample

Moderne Verfahren der Kryptographie. Von RSA zu Zero-Knowledge by Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter


by Kevin
4.5

Rated 4.82 of 5 – based on 44 votes