Understanding Cryptography
Abstract
Cryptography has crept into everything, from Web browsers and e-mail programs
to cell phones, bank cards, cars and even into medical implants. In the near future
we will see many new exciting applications for cryptography such as radio
frequency identification (RFID) tags for anti-counterfeiting or car-to-car communications
(we’ve worked on securing both of these applications). This is quite a
change from the past, where cryptography had been traditionally confined to very
specific applications, especially government communications and banking systems.
As a consequence of the pervasiveness of crypto algorithms, an increasing number
of people must understand how they work and how they can be applied in practice.
This book addresses this issue by providing a comprehensive introduction to
modern applied cryptography that is equally suited for students and practitioners in
industry.
Our book provides the reader with a deep understanding of how modern cryptographic
schemes work. We introduce the necessary mathematical concepts in a
way that is accessible for every reader with a minimum background in college-level
calculus. It is thus equally well suited as a textbook for undergraduate or beginning
graduate classes, or as a reference book for practicing engineers and computer
scientists who are interested in a solid understanding of modern cryptography.
The book has many features that make it a unique source for practitioners and students.
We focused on practical relevance by introducing most crypto algorithms that
are used in modern real-world applications. For every crypto scheme, up-to-date security
estimations and key length recommendations are given. We also discuss the
important issue of software and hardware implementation for every algorithm. In
addition to crypto algorithms, we introduce topics such as important cryptographic
protocols, modes of operation, security services and key establishment techniques.
Many very timely topics, e.g., lightweight ciphers which are optimized for constrained
applications (such as RFID tags or smart cards) or new modes of operations,
are also contained in the book.