6.2 MERKLE-DAMGARD CONSTRUCTION -- 6.4 EXEMPLARY HASH FUNCTIONS -- 6.4.1 MD4 -- 6.4.2 MD5 -- 6.4.3 SHA-1 -- 6.4.4 SHA-2 Family -- 6.4.5 KECCAK and the SHA-3 Family -- 6.5 FINAL REMARKS -- Part II SECRET KEY CRYPTOSYSTEMS -- Chapter 7 Pseudorandom Generators -- 7.1 INTRODUCTION -- 7.2 EXEMPLARY CONSTRUCTIONS -- 7.3 CRYPTOGRAPHICALLY SECURE PRGs -- 7.3.1 Blum-Micali PRG -- 7.3.2 RSA PRG -- 7.3.3 BBS PRG -- 7.4 FINAL REMARKS -- References -- Chapter 8 Pseudorandom Functions -- 8.1 INTRODUCTION -- 8.2 SECURITY OF A PRF -- 8.3 RELATIONSHIP BETWEEN PRGs AND PRFs -- 8.3.1 PRF-Based PRG -- 8.3.2 PRG-Based PRF -- 8.4 RANDOM ORACLE MODEL -- 8.5 FINAL REMARKS -- References -- Chapter 9 Symmetric Encryption -- 9.1 INTRODUCTION -- 9.1.1 Block and Stream Ciphers -- 9.1.2 Attacks -- 9.2 HISTORICAL PERSPECTIVE -- 9.3 PERFECTLY SECURE ENCRYPTION -- 9.3 PERFECTLY SECURE ENCRYPTION -- 9.4 COMPUTATIONALLY SECURE ENCRYPTION -- 9.5 STREAM CIPHERS -- 9.5.1 LFSR-Based Stream Ciphers -- 9.5.2 Other Stream Ciphers -- 9.6 BLOCK CIPHERS -- 9.6.1 DES -- 9.6.2 AES -- 9.7 MODES OF OPERATION -- 9.7.1 ECB -- 9.7.2 CBC -- 9.7.3 CFB -- 9.7.4 OFB -- 9.7.5 CTR -- 9.8 FINAL REMARKS -- References -- Chapter 10 Message Authentication -- 10.1 INTRODUCTION -- 10.2 INFORMATION-THEORETICALLY SECURE MESSAGE AUTHENTICATION -- 10.3 COMPUTATIONALLY SECURE MESSAGE AUTHENTICATION -- 10.3.1 MACs Using A Symmetric Encryption System -- 10.3.2 MACs Using Keyed Hash Functions -- 10.3.3 Carter-WegmanMACs -- 10.4 FINAL REMARKS -- References -- Chapter 11 Authenticated Encryption -- 11.1 INTRODUCTION -- 11.2 AEAD CONSTRUCTIONS -- 11.2.1 CCM -- 11.2.2 GCM -- 11.3 FINAL REMARKS -- References -- Part III PUBLIC KEY CRYPTOSYSTEMS -- Chapter 12 Key Establishment -- 12.1 INTRODUCTION -- 12.2 KEY DISTRIBUTION -- 12.2.1 Merkle’s Puzzles -- 12.2.2 Shamir’s Three-Pass Protocol.
17.1 UNKEYED CRYPTOSYSTEMS -- 17.2 SECRET KEY CRYPTOSYSTEMS -- 17.3 PUBLIC KEY CRYPTOSYSTEMS -- 17.4 FINAL REMARKS -- Chapter 18 Outlook -- 18.1 THEORETICAL VIEWPOINT -- 18.2 PRACTICAL VIEWPOINT -- 18.3 PQC -- 18.3.1 Code-based Cryptosystems -- 18.3.2 Hash-based Cryptosystems -- 18.3.3 Lattice-based Cryptosystems -- 18.3.4 Isogeny-based Cryptosystems -- 18.3.5 Multivariate-based Cryptosystems -- 18.4 CLOSING REMARKS -- References -- Appendix A Discrete Mathematics -- A.1 ALGEBRAIC BASICS -- A.1.1 Preliminary Remarks -- A.1.2 Algebraic Structures -- A.1.3 Homomorphisms -- A.1.4 Permutations -- A.2 INTEGER ARITHMETIC -- A.2.1 Integer Division -- A.2.2 Common Divisors and Multiples -- A.2.3 Euclidean Algorithms -- A.2.4 Prime Numbers -- A.2.5 Factorization -- A.2.6 Euler’s Totient Function -- A.3 MODULAR ARITHMETIC -- A.3.1 Modular Congruence -- A.3.2 Modular Exponentiation -- A.3.3 Chinese Remainder Theorem -- A.3.4 Fermat’s Little Theorem -- A.3.5 Euler’s Theorem -- A.3.6 Finite Fields Modulo Irreducible Polynomials -- A.3.7 Quadratic Residuosity -- A.3.8 Blum Integers -- References -- Appendix B Probability Theory -- B.1 BASIC TERMS AND CONCEPTS -- B.2 RANDOM VARIABLES -- B.2.1 Probability Distributions -- B.2.2 Marginal Distributions -- B.2.3 Conditional Probability Distributions -- B.2.4 Expectation -- B.2.5 Independence of Random Variables -- B.2.6 Markov’s Inequality -- B.2.7 Variance and Standard Deviation -- B.2.8 Chebyshev’s Inequality -- References -- Appendix C Information Theory -- C.1 INTRODUCTION -- C.2 ENTROPY -- C.2.1 Joint Entropy -- C.2.2 Conditional Entropy -- C.2.3 Mutual Information -- C.3 REDUNDANCY -- C.4 KEY EQUIVOCATION AND UNICITY DISTANCE -- References -- Appendix D Complexity Theory -- D.1 PRELIMINARY REMARKS -- D.2 INTRODUCTION -- D.3 ASYMPTOTIC ORDER NOTATION -- D.4 EFFICIENT COMPUTATIONS -- D.5 COMPUTATIONAL MODELS.
D.6 COMPLEXITY CLASSES -- D.6.1 Complexity Class P -- D.6.2 Complexity Classes NP and coNP -- D.6.3 Complexity Class PP and Its Subclasses -- D.7 FINAL REMARKS -- References -- List of Symbols -- Abbreviations and Acronyms -- About the Author -- Index.