资源描述:
《lecture notes on cryptography.pdf》由会员上传分享,免费在线阅读,更多相关内容在学术论文-天天文库。
1、LectureNotesonCryptographyShafiGoldwasser1MihirBellare2August20011MITLaboratoryofComputerScience,545TechnologySquare,Cambridge,MA02139,USA.E-mail:shafi@theory.lcs.mit.edu;Webpage:http://theory.lcs.mit.edu/shafi2DepartmentofComputerScienceandEngineering,
2、MailCode0114,UniversityofCaliforniaatSanDiego,9500GilmanDrive,LaJolla,CA92093,USA.E-mail:mihir@cs.ucsd.edu;Webpage:http://www-cse.ucsd.edu/users/mihirForewordThisisasetoflecturenotesoncryptographycompiledfor6.87s,aoneweeklongcourseoncryptographytaughtat
3、MITbyShaGoldwasserandMihirBellareinthesummersof1996{2001.ThenoteswereformedbymergingnoteswrittenforShaGoldwasser'sCryptographyandCryptanalysiscourseatMITwithnoteswrittenforMihirBellare'sCryptographyandnetworksecuritycourseatUCSD.Inaddition,RosarioGenn
4、aro(asTeachingAssistantforthecoursein1996)contributedSection9.6,Section11.4,Section11.5,andAppendixDtothenotes,andalsocompiled,fromvarioussources,someoftheproblemsinAppendixE.Cryptographyisofcourseavastsubject.Thethreadfollowedbythesenotesistodevelopand
5、explainthenotionofprovablesecurityanditsusageforthedesignofsecureprotocols.MuchofthematerialinChapters2,3and7isaresultofscribenotes,originallytakenbyMITgraduatestudentswhoattendedProfessorGoldwasser'sCryptographyandCryptanalysiscourseovertheyears,andlat
6、ereditedbyFrankD'Ippolitowhowasateachingassistantforthecoursein1991.FrankalsocontributedmuchoftheadvancednumbertheoreticmaterialintheAppendix.SomeofthematerialinChapter3isfromthechapteronCryptography,byR.Rivest,intheHandbookofTheoreticalComputerScience.
7、Chapters4,5,6,8and10,andSections9.5and7.4.6,werewrittenbyProfessorBellareforhisCryptographyandnetworksecuritycourseatUCSD.Allrightsreserved.ShaGoldwasserandMihirBellareCambridge,Massachusetts,August2001.2TableofContents1IntroductiontoModernCryptography
8、111.1Encryption:HistoricalGlance....................................111.2ModernEncryption:AComputationalComplexityBasedTheory................121.3AShortListofCandidateOneWayFunctions..........................131.4SecurityDenitio