| DC Field | Value | Language |
| dc.contributor.author | Smart, Nigel P. | - |
| dc.date.accessioned | 2021-04-21T08:05:58Z | - |
| dc.date.available | 2021-04-21T08:05:58Z | - |
| dc.date.issued | 2016 | - |
| dc.identifier.isbn | 978-3-319-21936-3 | - |
| dc.identifier.uri | http://localhost:8080/xmlui/handle/123456789/223 | - |
| dc.description | The background I assume is what one could expect of a third or fourth year undergraduate
in computer science. One can assume that such students have already met the basics of discrete
mathematics (modular arithmetic) and a little probability. In addition, they will have at some point
done (but probably forgotten) elementary calculus. Not that one needs calculus for cryptography,
but the ability to happily deal with equations and symbols is certainly helpful. Apart from that I
introduce everything needed from scratch. For those students who wish to dig into the mathematics
a little more, or who need some further reading, I have provided an appendix which covers most of
the basic algebra and notation needed to cope with modern cryptosystems.
It is quite common for computer science courses not to include much of complexity theory or
formal methods. Many such courses are based more on software engineering and applications of
computer science to areas such as graphics, vision or artificial intelligence. The main goal of such
courses is to train students for the workplace rather than to delve into the theoretical aspects of
the subject. Hence, I have introduced what parts of theoretical computer science I need, as and
when required.
I am not mathematically rigorous at all steps, given the target audience, but aim to give a
flavour of the mathematics involved. For example I often only give proof outlines, or may not
worry about the success probabilities of many of the reductions. I try to give enough of the gory
details to demonstrate why a protocol or primitive has been designed in a certain way. Readers
wishing for a more in-depth study of the various points covered or a more mathematically rigorous
coverage should consult one of the textbooks or papers in the Further Reading sections at the end
of each chapter.
On the other hand we use the terminology of groups and finite fields from the outset. This is for
two reasons. Firstly, it equips students with the vocabulary to read the latest research papers, and
hence enables students to carry on their studies at the research level. Secondly, students who do
not progress to study cryptography at the postgraduate level will find that to understand practical
issues in the “real world”, such as API descriptions and standards documents, a knowledge of this
terminology is crucial. We have taken this approach with our students in Bristol, who do not have
any prior exposure to this form of mathematics, and find that it works well as long as abstract
terminology is introduced alongside real-world concrete examples and motivation.
I have always found that when reading protocols and systems for the first time the hardest part
is to work out what is public information and which information one is trying to keep private. This
is particularly true when one meets a public key encryption algorithm for the first time, or one is
deciphering a substitution cipher. Hence I have continued with the colour coding from the earlier
book. Generally speaking items in red are secret and should never be divulged to anyone. Items in
blue are public information and are known to everyone, or are known to the party one is currently
pretending to be. | en_US |
| dc.description.abstract | This is a reworking of my earlier book “Cryptography: An Introduction” which has been
available online for over a decade. In the intervening years there have been major advances and
changes in the subject which have led me to revisit much of the material in this book. In the main the
book remains the same, in that it tries to present a non-rigorous treatment of modern cryptography,
which is itself a highly rigorous area of computer science/mathematics. Thus the book acts as a
stepping stone between more “traditional” courses which are taught to undergraduates around the
world, and the more advanced rigorous courses taught in graduate school.
The motivation for such a bridging book is that, in my view, the traditional courses (which deal
with basic RSA encryption and signatures, and perhaps AES) are not a suitable starting point.
They do not emphasize the importance of what it means for a system to be secure; and are often
introduced into a curriculum as a means of demonstrating the applicability of mathematical theory
as opposed to developing the material as a subject in its own right. However, most undergraduates
could not cope with a full-on rigorous treatment from the start. After all one first needs to get a
grasp of basic ideas before one can start building up a theoretical edifice.
The main differences between this version and the Third Edition of “Cryptography: An Intro-
duction” is in the ordering of material. Now security definitions are made central to the discussion
of modern cryptography, and all discussions of attacks and weaknesses are related back to these
definitions. We have found this to be a good way of presenting the material over the last few years
in Bristol; hence the reordering. In addition many topics have been updated, and explanations
improved. I have also made a number of the diagrams more pleasing to the eye.
Cryptography courses are now taught at all major universities; sometimes these are taught
in the context of a Mathematics degree, sometimes in the context of a Computer Science degree,
and sometimes in the context of an Electrical Engineering degree. Indeed, a single course often
needs to meet the requirements of all three types of students, plus maybe some from other subjects
who are taking the course as an “open unit”. The backgrounds and needs of these students are
different; some will require a quick overview of the algorithms currently in use, whilst others will
want an introduction to current research directions. Hence, there seems to be a need for a textbook
which starts from a low level and builds confidence in students until they are able to read the texts | en_US |
| dc.language.iso | en | en_US |
| dc.publisher | Springer | en_US |
| dc.subject | Cryptography | en_US |
| dc.subject | Information Security | en_US |
| dc.title | Cryptography Made Simple | en_US |
| dc.type | Book | en_US |
| Appears in Collections: | ARTS & SCIENCE
|