Cryptography algorithms explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography

This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more comp...

Full description

Bibliographic Details
Main Author: Bertaccini, Massimo
Format: eBook
Language:English
Published: Birmingham, UK Packt Publishing Ltd. 2024
Edition:Second edition
Series:Expert insight
Subjects:
Online Access:
Collection: O'Reilly - Collection details see MPG.ReNa
LEADER 05278nmm a2200373 u 4500
001 EB002228172
003 EBX01000000000000001365132
005 20251104000000.0
007 cr|||||||||||||||||||||
008 240903 ||| eng
020 |a 9781835087978 
050 4 |a QA268 
100 1 |a Bertaccini, Massimo 
245 0 0 |a Cryptography algorithms  |b explore new algorithms in zero-knowledge, homomorphic encryption, and quantum cryptography  |c Massimo Bertaccini 
250 |a Second edition 
260 |a Birmingham, UK  |b Packt Publishing Ltd.  |c 2024 
300 |a 410 pages  |b illustrations 
505 0 |a Includes bibliographical references and index 
505 0 |a Cover -- Copyright -- Contributors -- Table of Contents -- Preface -- Section 1: A Brief History and Outline of Cryptography -- Chapter 1: Deep Dive into Cryptography -- An introduction to cryptography -- Binary numbers, ASCII code, and notations -- Fermat's Last Theorem, prime numbers, and modular mathematics -- A brief history and a panoramic overview of cryptographic algorithms -- Rosetta Stone -- The Caesar cipher -- ROT13 -- The Beale ciphers -- The Vernam cipher -- Notes on security and computation -- Summary -- Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption) 
505 0 |a Chapter 2: Symmetric Encryption Algorithms -- Notations and operations in Boolean logic -- DES algorithms -- Simple DES -- Bit initialization -- Bit expansion -- Key generation -- Bit encryption -- DES -- Key generation in DES -- Analysis of the DES algorithm -- Violation of DES -- Triple DES -- DESX -- AES Rijndael -- Description of AES -- Attacks and vulnerabilities in AES -- Summary -- Chapter 3: Asymmetric Encryption Algorithms -- Introduction to asymmetric encryption -- The pioneers -- The Diffie-Hellman algorithm -- The discrete logarithm -- Explaining the D-H algorithm 
505 0 |a Analyzing the algorithm -- Possible attacks and cryptanalysis on the D-H algorithm -- RSA -- Explaining RSA -- Analyzing RSA -- Conventional attacks on the algorithm -- The application of RSA to verify international treaties -- Unconventional attacks -- PGP -- The ElGamal algorithm -- Summary -- Chapter 4: Hash Functions and Digital Signatures -- A basic explanation of hash functions -- Overview of the main hash algorithms -- Logic and notations to implement hash functions -- Explanation of the SHA-1 algorithm -- Notes and example on SHA-1 -- Example of one block encoded with SHA- 1 
505 0 |a Authentication and digital signatures -- RSA digital signatures -- Why do digital signatures work? -- Digital signatures with the ElGamal algorithm -- Blind signatures -- Blind signature with RSA -- Notes on the blind signature protocol -- Summary -- Section 3: New Cryptography Algorithms and Protocols -- Chapter 5: Zero-Knowledge Protocols -- The main scenario of a ZKP -- the digital cave -- Non-interactive ZKPs -- Demonstration of a non-interactive ZKP -- Demonstrating an attack on an RSA ZKP -- Schnorr's interactive ZKP -- A demonstration of an interactive ZKP 
505 0 |a A challenge for a disruptive attack on an interactive ZKP -- One-round ZKP -- How it works mathematically -- Numerical example -- Notes on the one-round protocol -- An introduction to zk-SNARKs -- spooky moon math -- Understanding how a zk-SNARK works -- Demonstrating an attack on a zk-SNARK protocol -- ZK13 -- a ZKP for authentication and key exchange -- ZK13 explained -- Demonstrating the ZK13 protocol -- Notes and possible attacks on the ZK13 protocol -- Possible attacks on ZK13 -- Summary -- Chapter 6: New Inventions in Cryptography and Logical Attacks 
653 |a Computer security / http://id.loc.gov/authorities/subjects/sh90001862 
653 |a Cryptography / http://id.loc.gov/authorities/subjects/sh85034453 
653 |a Cryptographie 
653 |a Sécurité informatique 
041 0 7 |a eng  |2 ISO 639-2 
989 |b OREILLY  |a O'Reilly 
490 0 |a Expert insight 
776 |z 9781835080030 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781835080030/?ar  |x Verlag  |3 Volltext 
082 0 |a 005.8/24 
520 |a This updated edition takes you on an journey through the realm of cryptographic science, providing an in-depth exploration of its history, principles, and the latest cutting-edge developments. You will learn the mathematical logic of how algorithms encrypt and decrypt messages, introducing more complex math as the book progresses. By getting your foot in the door with how elliptic curves, zero knowledge protocols, homomorphic encryption, and quantum computing shape today's cybersecurity landscape and its attacks and defenses, you will have the groundwork on which to build professional cryptographic experience. This edition will help keep you up to date with the most innovative cryptographic algorithms, ensuring you're well-prepared to navigate the rapidly evolving world of data privacy and cybersecurity. With a focus on emerging trends and challenges, including quantum cryptography you'll acquire the knowledge needed to stay at the forefront of this dynamic field. With the latest updates and an expanded scope, this new edition ensures you're well-prepared to face the ever-evolving landscape of cybersecurity with confidence and expertise