资源描述:
《(Mihir Bellare1 Phillip Rogaway2) Introduction to Modern Cryptography》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、IntroductiontoModernCryptographyMihirBellare1PhillipRogaway2May11,20051DepartmentofComputerScienceandEngineering,UniversityofCaliforniaatSanDiego,LaJolla,CA92093,USA.mihir@cs.ucsd.edu,http://www-cse.ucsd.edu/users/mihir2DepartmentofComputerScience,Kemper
2、HallofEngineering,UniversityofCaliforniaatDavis,Davis,CA95616,USA;andDepartmentofComputerScience,FacultyofScience,ChiangMaiUniversity,ChiangMai,50200Thailand.rogaway@cs.ucdavis.edu,http://www.cs.ucdavis.edu/∼rogaway2PrefaceThisisasetofclassnotesthatwehav
3、ebeendevelopingjointlyforsomeyears.Weusethemforcryptographycoursesthatweteachatourrespectiveinstitutions.Eachtimeoneofusteachestheclass,hetakesthetokenandupdatesthenotesabit.Theprocesshasresultedinanevolvingdocumentthathaslotsofgaps,aswellasplentyof“unha
4、rmonized”parts.Onedayitwill,withluck,becompleteandcogent.Theviewpointtakenthroughoutthesenotesistoemphasizethetheoryofcryptographyasitcanbeappliedtopractice.Thisisanapproachthatthetwoofushavepursuedinourresearch,anditseemstobeapedagogicallydesirableappro
5、achaswell.Wewouldliketothankthefollowingstudentsofpastversionsofourcourseswhohavepointedouterrorsandmadesuggestionsforchanges:AndreBarroso,KeithBell,KostasBimpikis,Alexan-draBoldyreva,DustinBoswell,BrianBuesker,MichaelBurton,ChrisCalabro,SashkaDavis,Alex
6、Gantman,BradleyHuffaker,HyunMinKang,VivekManpuria,ChanathipNamprempre,AdrianaPalacio,WenjingRao,FritzSchneider,JulianaWong.Wewelcomefurthercorrections,commentsandsuggestions.MihirBellareSanDiego,CaliforniaUSAPhillipRogawayDavis,CaliforniaUSAcMihirBellare
7、andPhillipRogaway,1997–2005.Contents1Introduction71.1Goalsandsettings.....................................71.2Othergoals.........................................131.3Whatcryptographyisabout................................161.4Approachestothestudyofcrypto
8、graphy........................181.5WhatbackgrounddoIneed?...............................251.6Problems..........................................252ClassicalEncryption292.1Substitutionciphers.................................