## Table of Contents

Click here to download a three-level table of contents (Postscript file)## Two-level Table of Contents

List of Tables

List of Figures

Foreword by R.L. Rivest

1 Overview of Cryptography

1.1 Introduction

1.2 Information security and cryptography

1.3 Background on functions

1.4 Basic terminology and concepts

1.5 Symmetric-key encryption

1.6 Digital signatures

1.7 Authentication and identification

1.8 Public-key cryptography

1.9 Hash functions

1.10 Protocols and mechanisms

1.11 Key establishment, management, and certification

1.12 Pseudorandom numbers and sequences

1.13 Classes of attacks and security models

1.14 Notes and further references

2 Mathematical Background

2.1 Probability theory

2.2 Information theory

2.3 Complexity theory

2.4 Number theory

2.5 Abstract algebra

2.6 Finite fields

2.7 Notes and further references

3 Number-Theoretic Reference Problems

3.1 Introduction and overview

3.2 The integer factorization problem

3.3 The RSA problem

3.4 The quadratic residuosity problem

3.5 Computing square roots in Zn

3.6 The discrete logarithm problem

3.7 The Diffie-Hellman problem

3.8 Composite moduli

3.9 Computing individual bits

3.10 The subset sum problem

3.11 Factoring polynomials over finite fields

3.12 Notes and further references

4 Public-Key Parameters

4.1 Introduction

4.2 Probabilistic primality tests

4.3 (True) Primality tests

4.4 Prime number generation

4.5 Irreducible polynomials over Zp

4.6 Generators and elements of high order

4.7 Notes and further references

5 Pseudorandom Bits and Sequences

5.1 Introduction

5.2 Random bit generation

5.3 Pseudorandom bit generation

5.4 Statistical tests

5.5 Cryptographically secure pseudorandom bit generation

5.6 Notes and further references

6 Stream Ciphers

6.1 Introduction

6.2 Feedback shift registers

6.3 Stream ciphers based on LFSRs

6.4 Other stream ciphers

6.5 Notes and further references

7 Block Ciphers

7.1 Introduction and overview

7.2 Background and general concepts

7.3 Classical ciphers and historical development

7.4 DES

7.5 FEAL

7.6 IDEA

7.7 SAFER, RC5, and other block ciphers

7.8 Notes and further references

8 Public-Key Encryption

8.1 Introduction

8.2 RSA public-key encryption

8.3 Rabin public-key encryption

8.4 ElGamal public-key encryption

8.5 McEliece public-key encryption

8.6 Knapsack public-key encryption

8.7 Probabilistic public-key encryption

8.8 Notes and further references

9 Hash Functions and Data Integrity

9.1 Introduction

9.2 Classification and framework

9.3 Basic constructions and general results

9.4 Unkeyed hash functions (MDCs)

9.5 Keyed hash functions (MACs)

9.6 Data integrity and message authentication

9.7 Advanced attacks on hash functions

9.8 Notes and further references

10 Identification and Entity Authentication

10.1 Introduction

10.2 Passwords (weak authentication)

10.3 Challenge-response identification (strong authentication)

10.4 Customized and zero-knowledge identification protocols

10.5 Attacks on identification protocols

10.6 Notes and further references

11 Digital Signatures

11.1 Introduction

11.2 A framework for digital signature mechanisms

11.3 RSA and related signature schemes

11.4 Fiat-Shamir signature schemes

11.5 The DSA and related signature schemes

11.6 One-time digital signatures

11.7 Other signature schemes

11.8 Signatures with additional functionality

11.9 Notes and further references

12 Key Establishment Protocols

12.1 Introduction

12.2 Classification and framework

12.3 Key transport based on symmetric encryption

12.4 Key agreement based on symmetric techniques

12.5 Key transport based on public-key encryption

12.6 Key agreement based on asymmetric techniques

12.7 Secret sharing

12.8 Conference keying

12.9 Analysis of key establishment protocols

12.10 Notes and further references

13 Key Management Techniques

13.1 Introduction

13.2 Background and basic concepts

13.3 Techniques for distributing confidential keys

13.4 Techniques for distributing public keys

13.5 Techniques for controlling key usage

13.6 Key management involving multiple domains

13.7 Key life cycle issues

13.8 Advanced trusted third party services

13.9 Notes and further references

14 Efficient Implementation

14.1 Introduction

14.2 Multiple-precision integer arithmetic

14.3 Multiple-precision modular arithmetic

14.4 Greatest common divisor algorithms

14.5 Chinese remainder theorem for integers

14.6 Exponentiation

14.7 Exponent recoding

14.8 Notes and further references

15 Patents and Standards

15.1 Introduction

15.2 Patents on cryptographic techniques

15.3 Cryptographic standards

15.4 Notes and further references

A Bibliography of Papers from Selected Cryptographic Forums

A.1 Asiacrypt/Auscrypt Proceedings

A.2 Crypto Proceedings

A.3 Eurocrypt Proceedings

A.4 Fast Software Encryption Proceedings

A.5 Journal of Cryptology papers

References

IndexReturn to the HAC home page