Contents

Foreword by Whitfield Diffie

Preface

HOW TO READ THIS BOOK

ACKNOWLEDGMENTS

About the Author

1 FOUNDATIONS

1.1 TERMINOLOGY

1.2 STEGANOGRAPHY

1.3 SUBSTITUTION CIPHERS AND TRANSPOSITION CIPHERS

1.4 SIMPLE XOR

1.5 ONE-TIME PADS

1.6 COMPUTER ALGORITHMS

1.7 LARGE NUMBERS

PART I CRYPTOGRAPHIC PROTOCOLS

2 PROTOCOL BUILDING BLOCKS

2.1 INTRODUCTION TO PROTOCOLS

2.2 COMMUNICATIONS USING SYMMETRIC CRYPTOGRAPHY

2.3 ONE-WAY FUNCTIONS

2.4 ONE-WAY HASH FUNCTIONS

2.5 COMMUNICATIONS USING PUBLIC-KEY CRYPTOGRAPHY

2.6 DIGITAL SIGNATURES

2.7 DIGITAL SIGNATURES WITH ENCRYPTION

2.8 RANDOM AND PSEUDO-RANDOM-SEQUENCE GENERATION

3 BASIC PROTOCOLS

3.1 KEY EXCHANGE

3.2 AUTHENTICATION

3.3 AUTHENTICATION AND KEY EXCHANGE

3.4 FORMAL ANALYSIS OF AUTHENTICATION AND KEY-EXCHANGE PROTOCOLS

3.5 MULTIPLE-KEY PUBLIC-KEY CRYPTOGRAPHY

3.6 SECRET SPLITTING

3.7 SECRET SHARING

3.8 CRYPTOGRAPHIC PROTECTION OF DATABASES

4 INTERMEDIATE PROTOCOLS

4.1 TIMESTAMPING SERVICES

4.2 SUBLIMINAL CHANNEL

4.3 UNDENIABLE DIGITAL SIGNATURES

4.4 DESIGNATED CONFIRMER SIGNATURES

4.5 PROXY SIGNATURES

4.6 GROUP SIGNATURES

4.7 FAIL-STOP DIGITAL SIGNATURES

4.8 COMPUTING WITH ENCRYPTED DATA

4.9 BIT COMMITMENT

4.10 FAIR COIN FLIPS

4.11 MENTAL POKER

4.12 ONE-WAY ACCUMULATORS

4.13 ALL-OR-NOTHING DISCLOSURE OF SECRETS

4.14 KEY ESCROW

5 ADVANCED PROTOCOLS

5.1 ZERO-KNOWLEDGE PROOFS

5.2 ZERO-KNOWLEDGE PROOFS OF IDENTITY

5.3 BLIND SIGNATURES

5.4 IDENTITY-BASED PUBLIC-KEY CRYPTOGRAPHY

5.5 OBLIVIOUS TRANSFER

5.6 OBLIVIOUS SIGNATURES

5.7 SIMULTANEOUS ...

Get Applied Cryptography: Protocols, Algorithms, and Source Code in C, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.