HISTORY AND BASIC CRYPTOGRAPHIC CONCEPTS Terminology Classical Ciphers Classification of Attacks PROTOCOLS, DISCRETE LOG, AND DIFFIE-HELLMAN Cryptographic Protocols The Discrete Log Problem Exponentiation Ciphers and Diffie-Hellman PUBLIC-KEY CRYPTOGRAPHY One-Way Functions Public-Key Cryptosystems and RSA ElGamal Cryptosystems Symmetric vs. Asymmetric Cryptosystems Secret History of Public-Key Cryptography PROBABILISTIC PRIMALITY TESTS Introduction Pseudoprimes and Carmichael Numbers Solovay-Strassen Test Miller-Selfridge-Rabin Test FACTORING Universal Exponent Method Pollard's p - 1 Method Lenstra's Elliptic Curve Method Multipolynomial Quadratic Sieve The Number Field Sieve SECURITY OF RSA Implementation Attacks Exponent Attacks Strong Moduli Generation of Random Primes AUTHENTICATION Identification, Impersonation, & Signatures Digital Signature Schemes Digital Cash and Electronic Commerce KEY MANAGEMENT Secret Sharing Key Establishment Public-Key Infrastructure (PKI) APPLICATIONS AND THE FUTURE Secrecy and Authentication Other Threats to System Security Wireless Security Smart Cards and Biometrics APPENDICES Letter Frequency Analysis Elementary Complexity Theory Fundamental Facts Solutions to Odd-Numbered Exercises Bibliography List of Symbols Indextation Attacks Exponent Attacks Strong Moduli Generation of Random Primes AUTHENTICATION Identification, Impersonation, & Signatures Digital Signature Schemes Digital Cash and Electronic Commerce KEY MANAGEMENT Secret Sharing Key Establishment Public-Key Infrastructure (PKI) APPLICATIONS AND THE FUTURE Secrecy and Authentication Other Threats to System Security Wireless Security Smart Cards and Biometrics APPENDICES Letter Frequency Analysis Elementary Complexity Theory Fundamental Facts Solutions to Odd-Numbered Exercises Bibliography List of Symbols Index.
RSA and Public-Key Cryptography