Cryptography Algorithms Explore New Algorithms in Zero-Knowledge, Homomorphic Encryption, and Quantum Cryptography

This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more comp...

Descripción completa

Detalles Bibliográficos
Otros Autores: Bertaccini, Massimo, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Birmingham, England : Packt Publishing Ltd [2022]
Edición:Second edition
Colección:Expert insight.
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009843335506719
Tabla de Contenidos:
  • Cover
  • Copyright
  • Contributors
  • Table of Contents
  • Preface
  • Section 1: A Brief History and Outline of Cryptography
  • Chapter 1: Deep Dive into Cryptography
  • An introduction to cryptography
  • Binary numbers, ASCII code, and notations
  • Fermat's Last Theorem, prime numbers, and modular mathematics
  • A brief history and a panoramic overview of cryptographic algorithms
  • Rosetta Stone
  • The Caesar cipher
  • ROT13
  • The Beale ciphers
  • The Vernam cipher
  • Notes on security and computation
  • Summary
  • Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption)
  • Chapter 2: Symmetric Encryption Algorithms
  • Notations and operations in Boolean logic
  • DES algorithms
  • Simple DES
  • Bit initialization
  • Bit expansion
  • Key generation
  • Bit encryption
  • DES
  • Key generation in DES
  • Analysis of the DES algorithm
  • Violation of DES
  • Triple DES
  • DESX
  • AES Rijndael
  • Description of AES
  • Attacks and vulnerabilities in AES
  • Summary
  • Chapter 3: Asymmetric Encryption Algorithms
  • Introduction to asymmetric encryption
  • The pioneers
  • The Diffie-Hellman algorithm
  • The discrete logarithm
  • Explaining the D-H algorithm
  • Analyzing the algorithm
  • Possible attacks and cryptanalysis on the D-H algorithm
  • RSA
  • Explaining RSA
  • Analyzing RSA
  • Conventional attacks on the algorithm
  • The application of RSA to verify international treaties
  • Unconventional attacks
  • PGP
  • The ElGamal algorithm
  • Summary
  • Chapter 4: Hash Functions and Digital Signatures
  • A basic explanation of hash functions
  • Overview of the main hash algorithms
  • Logic and notations to implement hash functions
  • Explanation of the SHA-1 algorithm
  • Notes and example on SHA-1
  • Example of one block encoded with SHA- 1
  • Authentication and digital signatures
  • RSA digital signatures
  • Why do digital signatures work?.
  • Digital signatures with the ElGamal algorithm
  • Blind signatures
  • Blind signature with RSA
  • Notes on the blind signature protocol
  • Summary
  • Section 3: New Cryptography Algorithms and Protocols
  • Chapter 5: Zero-Knowledge Protocols
  • The main scenario of a ZKP - the digital cave
  • Non-interactive ZKPs
  • Demonstration of a non-interactive ZKP
  • Demonstrating an attack on an RSA ZKP
  • Schnorr's interactive ZKP
  • A demonstration of an interactive ZKP
  • A challenge for a disruptive attack on an interactive ZKP
  • One-round ZKP
  • How it works mathematically
  • Numerical example
  • Notes on the one-round protocol
  • An introduction to zk-SNARKs - spooky moon math
  • Understanding how a zk-SNARK works
  • Demonstrating an attack on a zk-SNARK protocol
  • ZK13 - a ZKP for authentication and key exchange
  • ZK13 explained
  • Demonstrating the ZK13 protocol
  • Notes and possible attacks on the ZK13 protocol
  • Possible attacks on ZK13
  • Summary
  • Chapter 6: New Inventions in Cryptography and Logical Attacks
  • The genesis of the MB09 algorithm and blockchain
  • Introducing the MB09 algorithm and an attempt at demonstrating Fermat's Last Theorem
  • An extensive explanation of the MB09 algorithm
  • Introducing the MBXI algorithm
  • A numerical example of MBXI
  • Notes on the MBXI algorithm and the prelude to an attack on RSA
  • Unconventional attacks and self-reverse decryption on RSA
  • A new protocol to protect RSA and asymmetric algorithms from spying
  • Digital signatures on MBXI
  • A direct signature method in MBXI
  • The appendix signature method with MBXI
  • A mathematical demonstration of the MBXI digital signature algorithm
  • The evolution of MB09 and MBXI: an introduction to MBXX
  • An explanation of the MBXX protocol
  • Notes on the MBXX protocol
  • Conclusions on the MBXX protocol
  • Lightweight encryption.
  • Encryption with Cybpher
  • Summary
  • Chapter 7: Elliptic Curves
  • An overview of elliptic curves
  • Operations on elliptic curves
  • Scalar multiplication
  • Implementing the D-H algorithm on elliptic curves
  • Elliptic curve secp256k1: the Bitcoin digital signature
  • Step 1: Generating keys
  • Step 2: Performing the digital signature in secp256k1
  • Step 3: Verifying the digital signature
  • A numerical exercise on a digital signature on secp256k1
  • Attacks on ECDSA and the security of elliptic curves
  • Step 1: Discovering the random key, [k]
  • Step 2: Recovering the private key, [d]
  • Considerations about the future of ECC
  • Summary
  • Chapter 8: Introduction to Homomorphic Encryption and Crypto Search Engine
  • Introduction to CSE: homomorphism
  • Partial homomorphism in RSA
  • Analysis of homomorphic encryption and its implications
  • Math and logic behind search engines
  • Introduction to trees: graph theory
  • Huffman code
  • Hash and Boolean logic
  • CSE explained
  • The innovation in CSE
  • Computational analysis on CSE
  • Example of computational brute-force cracking
  • Applications of CSE
  • The new frontier of CSE and a new quantum algorithm for message transmission: QTM
  • Summary
  • Section 4: Quantum Cryptography
  • Chapter 9: Quantum Cryptography
  • Introduction to Q-Mechanics and Q-Cryptography
  • An experiment that changed the story of quantum
  • An imaginary experiment to understand the elements of Q-Mechanics
  • Step 1: superposition
  • Step 2: the indeterminacy principle
  • Step 3: spin and entanglement
  • Origin of Q-Cryptography: quantum money
  • QKD: BB84
  • Step 1: initializing the quantum channel
  • Step 2: transmitting the photons
  • Step 3: determining the shared key
  • Analysis of attack and technical issues
  • Quantum computing
  • Shor's algorithm
  • Hypothesis and thesis
  • Step 1: initializing the qubits.
  • Step 2: choosing the random number, (a)
  • Step 3: quantum measurement
  • Step 4: finding the right candidate, (r)
  • QFT
  • Step 5: factorizing (n)
  • Notes on Shor's algorithm
  • Post-Q-Cryptography
  • Summary
  • Chapter 10: Quantum Search Algorithms and Quantum Computing
  • An overview of Grover's algorithm
  • Elements of quantum programming: quantum information and circuits
  • Classical information
  • Quantum information, gates, and circuits
  • Pauli gates (X, Z)
  • Identity gate
  • Hadamard gate
  • Deep dive into Grover's algorithm
  • Pseudocode for running Grover's algorithm
  • Step 1: Allocate the register of qubits in superposition
  • Step 2: Iterations on Grover's operator: G
  • The unique search problem and the amplitude amplification probability
  • Step 1: The promise of the inputs
  • Step 2: Grover's operation G
  • Step 3: Quantum measurement
  • Summary
  • Other Books You May Enjoy
  • Index.