Post-Quantum Cryptography (eBook)

eBook Download: PDF
2009 | 1. Auflage
X, 246 Seiten
Springer-Verlag
978-3-540-88702-7 (ISBN)

Lese- und Medienproben

Post-Quantum Cryptography -  Daniel J. Bernstein,  Johannes Buchmann,  Erik Dahmen
Systemvoraussetzungen
149,79 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen

Quantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature systems.

Leading experts have joined forces for the first time to explain the state of the art in quantum computing, hash-based cryptography, code-based cryptography, lattice-based cryptography, and multivariate cryptography. Mathematical foundations and implementation issues are included.

This book is an essential resource for students and researchers who want to contribute to the field of post-quantum cryptography.



Daniel J. Bernstein is a research professor in the Department of Computer Science at the University of Illinois at Chicago. Professor Bernstein has received a U.S. National
Science Foundation CAREER award, a Cyber Trust award, three more U.S.government grants, and a Sloan Research Fellowship for his research in computational number theory, cryptography, and computer security. He is the author of several dozen papers and two of the Internet's most popular server software packages, djbdns and qmail.

Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technische Universität Darmstadt and an associate editor of the  Journal of Cryptology. He received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. He also received the Karl Heinz-Beckurts Award for  technology transfer. He is a member of the German Academy of Science and Engieneering.

Erik Dahmen is a PhD student in Prof. Buchmann's research group at the Technische Universität Darmstadt. He received his diploma degree in Mathematics from the Technische Universität Darmstadt in 2006. Erik Dahmen is the author of various research papers on hash-based cryptography.

Daniel J. Bernstein is a research professor in the Department of Computer Science at the University of Illinois at Chicago. Professor Bernstein has received a U.S. NationalScience Foundation CAREER award, a Cyber Trust award, three more U.S.government grants, and a Sloan Research Fellowship for his research in computational number theory, cryptography, and computer security. He is the author of several dozen papers and two of the Internet's most popular server software packages, djbdns and qmail. Johannes A. Buchmann is a Professor of Computer Science and Mathematics at the Technische Universität Darmstadt and an associate editor of the  Journal of Cryptology. He received the most prestigious award in science in Germany, the Leibniz Award of the German Science Foundation. He also received the Karl Heinz-Beckurts Award for  technology transfer. He is a member of the German Academy of Science and Engieneering. Erik Dahmen is a PhD student in Prof. Buchmann's research group at the Technische Universität Darmstadt. He received his diploma degree in Mathematics from the Technische Universität Darmstadt in 2006. Erik Dahmen is the author of various research papers on hash-based cryptography.

Preface 5
Contents 6
List of Contributors 8
Introduction to post-quantum cryptography 9
1 Is cryptography dead? 9
2 A taste of post-quantum cryptography 14
3 Challenges in post-quantum cryptography 19
4 Comparison to quantum cryptography 21
Quantum computing 23
1 Classical cryptography and quantum computing 23
2 The computational model 27
3 The quantum Fourier transform 30
4 The hidden subgroup problem 33
5 Search algorithms 37
6 Outlook 39
References 40
Hash-based Digital Signature Schemes 43
1 Hash based one-time signature schemes 44
2 Merkle’s tree authentication scheme 48
3 One-time key-pair generation using an PRNG 52
4 Authentication path computation 54
5 Tree chaining 77
6 Distributed signature generation 81
7 Security of the Merkle Signature Scheme 89
References 99
Code-based cryptography 103
1 Introduction 103
2 Cryptosystems 104
3 The security of computing syndromes as one-way function 114
4 Codes and structures 124
5 Practical aspects 135
6 Annex 145
References 149
Lattice-based Cryptography 155
1 Introduction 155
2 Preliminaries 160
3 Finding Short Vectors in Random q-ary Lattices 162
4 Hash Functions 165
5 Public Key Encryption Schemes 173
6 Digital Signature Schemes 188
7 Other Cryptographic Primitives 193
8 Open Questions 194
References 195
Multivariate Public Key Cryptography 201
1 Introduction 201
2 The Basics of Multivariate PKCs 202
3 Examples of Multivariate PKCs 206
4 Basic Constructions and Variations 210
5 Standard Attacks 223
6 The Future 237
References 242
Index 251

Erscheint lt. Verlag 1.2.2009
Zusatzinfo X, 246 p.
Verlagsort Berlin
Sprache englisch
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Mathematik Statistik
Mathematik / Informatik Mathematik Wahrscheinlichkeit / Kombinatorik
Technik
Schlagworte Computer Security • cryptography • Cryptology • IT Security • post quantum cryptography • Quantum Computing • Quantum Cryptography
ISBN-10 3-540-88702-4 / 3540887024
ISBN-13 978-3-540-88702-7 / 9783540887027
Haben Sie eine Frage zum Produkt?
Wie bewerten Sie den Artikel?
Bitte geben Sie Ihre Bewertung ein:
Bitte geben Sie Daten ein:
PDFPDF (Wasserzeichen)
Größe: 5,9 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Umfassendes Sicherheits-, Kontinuitäts- und Risikomanagement mit …

von Klaus-Rainer Müller

eBook Download (2023)
Springer Vieweg (Verlag)
79,99
Das umfassende Handbuch

von Michael Kofler; Klaus Gebeshuber; Peter Kloep …

eBook Download (2022)
Rheinwerk Computing (Verlag)
49,90