Most public-key schemes are based on number theory. While the
reader can take the number theoretic results on faith, it is useful to have a
basic grasp of the concepts of number theory.
Chapter 8 provides an overview and numerous examples
to clarify the concepts.
Chapter 9 introduces
public-key cryptography and concentrates on its use to provide confidentiality.
This chapter also examines the most widely used public-key cipher, the
Rivest-Shamir-Adleman (RSA) algorithm.
Chapter 10 revisits
the issue of key management in light of the capabilities of symmetric ciphers.
The chapter also covers the widely used Diffie-Hellman key exchange technique
and looks at a more recent public-key approach based on elliptic curves.
Of equal importance to confidentiality as a security measure is
authentication. At a minimum, message authentication assures that a message
comes from the alleged source. In addition, authentication can include
protection against modification, delay, replay, and reordering.
Chapter 11 begins with an analysis of the requirements
for authentication and then provides a systematic presentation of approaches to
authentication. A key element of authentication schemes is the use of an
authenticator, usually either a message authentication code (MAC) or a hash
function. Design considerations for both of these types of algorithms are
examined, and several specific examples are analyzed.
Chapter 12 extends
the discussion of the preceding chapter to discuss two of the most important
cryptographic hash functions (SHA and Whirlpool) and two of the most important
MACs (HMAC) and CMAC.
An important type of authentication is the digital signature.
Chapter 13 examines the techniques
used to construct digital signatures and looks at an important standard, the
Digital Signature Standard (DSS).
The various authentication techniques based on digital
signatures are building blocks in putting together authentication algorithms.
The design of such algorithms involves the analysis of subtle attacks that can
defeat many apparently secure protocols. This issue is also addressed in
Chapter 14.
No comments:
Post a Comment