Understanding Cryptography (From Established Symmetric and Asymmetric Ciphers To Post-Quantum Algorithms) (2nd Edition) Paar PDF
Understanding Cryptography (From Established Symmetric and Asymmetric Ciphers To Post-Quantum Algorithms) (2nd Edition) Paar PDF
standing-cryptography-from-established-symmetric-and-asymmetric-ciphe
Understanding
Cryptography
From Established Symmetric
and Asymmetric Ciphers
to Post-Quantum Algorithms
Second Edition
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
Understanding Cryptography
From Established Symmetric and Asymmetric
Ciphers to Post-Quantum Algorithms
Second Edition
Tim Güneysu
Ruhr University Bochum
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
Bochum, Germany
This Springer imprint is published by the registered company Springer-Verlag GmbH, DE, part of
Springer Nature.
The registered company address is: Heidelberger Platz 3, 14197 Berlin, Germany
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
vii
This Book is Available on YakiBooki.com
viii Foreword
From Established Symmetric and Asymmetric Ciphers to Post-Quantum
has converged on possible standards based on three particular hard problems; this
textbook covers all three approaches. Indeed, this textbook may be the first to cover
PQC (post-quantum cryptography).
This textbook also has updated material on “conventional” (non-public-key)
cryptography. For example, it includes new and/or updated material on crypto-
graphic hash functions (including coverage of SHA-2 and SHA-3), stream ciphers
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
(including Salsa20 and ChaCha), and modes of operation (including authenticated
encryption modes).
In summary, I recommend this book highly for both undergraduate and graduate
classroom use; it can easily be augmented for students with a more theoretical ori-
entation. This book is also recommended for self-study, for anyone who wishes to
bring themselves up-to-date on where this exciting field is going.
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
Content Overview
The book has many features that make it a unique source for students, practition-
ers and researchers. We focus on practical relevance by introducing the majority
of cryptographic algorithms that are used in modern real-world applications. With
respect to symmetric algorithms, we introduce the block ciphers AES, DES and
ix
This Book is Available on YakiBooki.com
x Preface
From Established Symmetric and Asymmetric Ciphers to Post-Quantum
triple-DES as well as PRESENT, which is an important example of a lightweight
cipher. We also describe three popular stream ciphers. Regarding asymmetric cryp-
tography, we cover all three public-key families currently in use: RSA, discrete log-
arithm schemes and elliptic curves. In addition, the book introduces hash functions,
digital signatures and message authentication codes, or MACs. Beyond core cryp-
tographic algorithms, we also discuss topics such as modes of operation, security
tanding-cryptography-from-established-symmetric-and-asymmetric-ciph
services and key management. For every cryptographic scheme, up-to-date security
estimations and recommendations for key lengths are given. We also discuss the
important issue of software and hardware implementation.
What’s New
The second edition has received major updates and has grown from the 350 pages
of the first edition to more than 500 pages. The most noticeable new material is the
extensive treatment of post-quantum cryptography, or PQC, in Chapter 12. In the
coming years, many applications will need to replace traditional public-key schemes
with PQC algorithms. This will be the most comprehensive change in the landscape
of cryptography that we have seen in decades. We hope that our introduction to the
three most promising PQC families, that is lattice-based, code-based and hash-based
schemes, will be helpful in this context. Beside PQC, the 2nd edition also covers the
SHA-2 and SHA-3 hash functions, the new stream ciphers Salsa20 and ChaCha,
and authenticated encryption. Throughout the book, security parameters and
related work have been updated, as well as the Discussion and Further Reading
sections that conclude each chapter. The problem sections of all 14 chapters have
been extended, too.
The material in this book has evolved over many years and is “classroom proven”.
We’ve taught it both as a course for advanced undergraduate students and gradu-
ate students in computer science/math/electrical engineering, as well as a first-year
undergraduate course for students majoring in our IT security program. We found
that one can teach most concepts introduced in the book in a two-semester course,
with 90 minutes of lecture time plus 90 minutes of help sessions with exercises per
week (total of 10 ECTS credits). In a typical US-style three-credit course, or in a
one-semester European course, some of the material should be omitted. Here are
some reasonable choices for a one-semester course:
Course Curriculum 1 Focus on the application of cryptography, e.g., in an applied
course in computer science or a basic course for subsequent security classes, e.g., in
a cybersecurity program. A possible curriculum is: Chap. 1; Sects. 2.1–2.2; Chap. 4;
Sect. 5.1; Chap. 6; Sects. 7.1–7.3; Sects. 8.1–8.3; Sects. 10.1–10.2; Sects. 11.1–11.3;
Sects. 12.1 & 12.4; Sect. 13.1; Sects. 14.1–14.3.
There are two online sources related to this book that we can recommend. First,
we recorded the two-semester introductory cryptography course that we teach at
Ruhr University Bochum (RUB). The main audience for this class are the first-
year students of RUB‘s IT Security program, and we tried to make the material as
accessible as possible. More than 20 lectures are available on the YouTube channel
“Introduction to Cryptography by Christof Paar”:
https://www.crypto-textbook.com/video
Each lecture takes about 80–90 minutes and closely follows the material in the book.
(For the more adventurous reader, there is also a German-language set of videos
available in the YouTube channel “Einführung in die Kryptographie von Christof
Paar”.)
Second, we recommend the companion website for the book, containing slide
sets for lecturers and solutions to odd-numbers problems of the book:
https://www.crypto-textbook.com