skip to main content
Skip header Section
Introduction to Modern Cryptography, Second EditionNovember 2014
Publisher:
  • Chapman & Hall/CRC
ISBN:978-1-4665-7026-9
Published:06 November 2014
Pages:
603
Skip Bibliometrics Section
Bibliometrics
Skip Abstract Section
Abstract

Cryptography is ubiquitous and plays a key role in ensuring data secrecy and integrity as well as in securing computer systems more broadly. Introduction to Modern Cryptography provides a rigorous yet accessible treatment of this fascinating subject. The authors introduce the core principles of modern cryptography, with an emphasis on formal definitions, clear assumptions, and rigorous proofs of security. The book begins by focusing on private-key cryptography, including an extensive treatment of private-key encryption, message authentication codes, and hash functions. The authors also present design principles for widely used stream ciphers and block ciphers including RC4, DES, and AES, plus provide provable constructions of stream ciphers and block ciphers from lower-level primitives. The second half of the book covers public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, and El Gamal cryptosystems (and others), followed by a thorough treatment of several standardized public-key encryption and digital signature schemes. Integrating a more practical perspective without sacrificing rigor, this widely anticipated Second Edition offers improved treatment of: Stream ciphers and block ciphers, including modes of operation and design principles Authenticated encryption and secure communication sessions Hash functions, including hash-function applications and design principles Attacks on poorly implemented cryptography, including attacks on chained-CBC encryption, padding-oracle attacks, and timing attacks The random-oracle model and its application to several standardized, widely used public-key encryption and signature schemes Elliptic-curve cryptography and associated standards such as DSA/ECDSA and DHIES/ECIES Containing updated exercises and worked examples, Introduction to Modern Cryptography, Second Edition can serve as a textbook for undergraduate- or graduate-level courses in cryptography, a valuable reference for researchers and practitioners, or a general introduction suitable for self-study.

Cited By

  1. ACM
    Mann Z, Weinert C, Chabal D and Bos J (2023). Towards Practical Secure Neural Network Inference: The Journey So Far and the Road Ahead, ACM Computing Surveys, 56:5, (1-37), Online publication date: 31-May-2024.
  2. Daudén-Esmel C, Castellà-Roca J and Viejo A (2024). Blockchain-based access control system for efficient and GDPR-compliant personal data management, Computer Communications, 214:C, (67-87), Online publication date: 15-Jan-2024.
  3. Yang X, Zhao Y, Zhou S and Wang L (2024). A lightweight delegated private set intersection cardinality protocol, Computer Standards & Interfaces, 87:C, Online publication date: 1-Jan-2024.
  4. Varma I and Kumar N (2023). A comprehensive survey on SDN and blockchain-based secure vehicular networks, Vehicular Communications, 44:C, Online publication date: 1-Dec-2023.
  5. Saini R, Bera A, Behera B, Ahmed E, Jamjoom M and Farouk A (2023). Designing quantum blockchain system integrated with 6G network, Journal of King Saud University - Computer and Information Sciences, 35:10, Online publication date: 1-Dec-2023.
  6. ACM
    Tan Q, Fisseha Y, Chen S, Biernacki L, Jeannin J, Malik S and Austin T Security Verification of Low-Trust Architectures Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, (945-959)
  7. Modiri M, Salmasizadeh M, Mohajeri J and Khalaj B (2023). Two protocols for improving security during the authentication and key agreement procedure in the 3GPP networks, Computer Communications, 211:C, (286-301), Online publication date: 1-Nov-2023.
  8. ACM
    Abadi A and Murdoch S Payment with Dispute Resolution: A Protocol for Reimbursing Frauds Victims Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, (855-869)
  9. ACM
    Hristov T, İşler D, Laoutaris N and Erkin Z Graph Database Watermarking Using Pseudo-Nodes Proceedings of the Second ACM Data Economy Workshop, (14-20)
  10. Zhang Q, Yu Y, Li H, Yu J and Wang L (2023). Trustworthy sealed-bid auction with low communication cost atop blockchain, Information Sciences: an International Journal, 631:C, (202-217), Online publication date: 1-Jun-2023.
  11. ACM
    Nouma S and Yavuz A Practical Cryptographic Forensic Tools for Lightweight Internet of Things and Cold Storage Systems Proceedings of the 8th ACM/IEEE Conference on Internet of Things Design and Implementation, (340-353)
  12. ACM
    Sober M, Kobelt M, Scaffino G, Kaaser D and Schulte S Distributed Key Generation with Smart Contracts using zk-SNARKs Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, (231-240)
  13. Zhang M, Liu J, Feng K, Beltran F and Zhang Z (2023). SmartAuction, Future Generation Computer Systems, 138:C, (198-211), Online publication date: 1-Jan-2023.
  14. ACM
    Hallman R Poster EveGAN Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, (3355-3357)
  15. ACM
    Nazirkhanova K, Neu J and Tse D Information Dispersal with Provable Retrievability for Rollups Proceedings of the 4th ACM Conference on Advances in Financial Technologies, (180-197)
  16. ACM
    Keller P and Böhme R Parallel Proof-of-Work with Concrete Bounds Proceedings of the 4th ACM Conference on Advances in Financial Technologies, (1-15)
  17. Krasnowski P, Lebrun J and Martin B (2022). A novel distortion-tolerant speech encryption scheme for secure voice communication, Speech Communication, 143:C, (57-72), Online publication date: 1-Sep-2022.
  18. Tian C and Chen G (2022). An infinite perfect-secrecy system with non-uniformly distributed keys, Journal of Information Security and Applications, 68:C, Online publication date: 1-Aug-2022.
  19. Chang J, Ren Q, Ji Y, Xu M and Xue R (2022). Secure medical data management with privacy-preservation and authentication properties in smart healthcare system, Computer Networks: The International Journal of Computer and Telecommunications Networking, 212:C, Online publication date: 20-Jul-2022.
  20. ACM
    Caulfield A, Rattanavipanon N and De Oliveira Nunes I ASAP Proceedings of the 59th ACM/IEEE Design Automation Conference, (721-726)
  21. ACM
    Ajtai M, Braverman V, Jayram T, Silwal S, Sun A, Woodruff D and Zhou S The White-Box Adversarial Data Stream Model Proceedings of the 41st ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (15-27)
  22. ACM
    Ulitzsch V, Park S, Marzougui S and Seifert J A Post-Quantum Secure Subscription Concealed Identifier for 6G Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (157-168)
  23. Panda S, Mondal S, Dewri R and Das A (2022). Towards achieving efficient access control of medical data with both forward and backward secrecy, Computer Communications, 189:C, (36-52), Online publication date: 1-May-2022.
  24. Nakano K (2022). Time-symmetric Turing machines for computable involutions, Science of Computer Programming, 215:C, Online publication date: 1-Mar-2022.
  25. Ali M, Sadeghi M, Liu X, Miao Y and Vasilakos A (2022). Verifiable online/offline multi-keyword search for cloud-assisted Industrial Internet of Things, Journal of Information Security and Applications, 65:C, Online publication date: 1-Mar-2022.
  26. Singh J and Chaudhary N (2022). OAuth 2.0 , Journal of Information Security and Applications, 65:C, Online publication date: 1-Mar-2022.
  27. Xu Y, Peng C, Tan W, Tian Y, Ma M and Niu K (2022). Non-interactive verifiable privacy-preserving federated learning, Future Generation Computer Systems, 128:C, (365-380), Online publication date: 1-Mar-2022.
  28. J. A and R. S (2022). A faster secure content-based image retrieval using clustering for cloud▪, Expert Systems with Applications: An International Journal, 189:C, Online publication date: 1-Mar-2022.
  29. ACM
    Wang X Progress in Applying Valuated Binary Tree to Factorize Big Integers Proceedings of the 2022 7th International Conference on Intelligent Information Technology, (90-94)
  30. Rabie T, Baziyad M and Kamel I (2021). Secure high payload steganography, Journal of Information Security and Applications, 63:C, Online publication date: 1-Dec-2021.
  31. Mohit P (2021). An efficient mutual authentication and privacy prevention scheme for e-healthcare monitoring, Journal of Information Security and Applications, 63:C, Online publication date: 1-Dec-2021.
  32. ACM
    Delpech de Saint Guilhem C, Makri E, Rotaru D and Tanguy T The Return of Eratosthenes: Secure Generation of RSA Moduli using Distributed Sieving Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, (594-609)
  33. Yin F, Lu R, Zheng Y, Shao J, Yang X and Tang X (2021). Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud, Computers and Security, 110:C, Online publication date: 1-Nov-2021.
  34. ACM
    Zhandry M (2021). How to Construct Quantum Random Functions, Journal of the ACM, 68:5, (1-43), Online publication date: 31-Oct-2021.
  35. ACM
    Yao Y, Ghai T, Ravi S and Szekely P AMPPERE Proceedings of the 30th ACM International Conference on Information & Knowledge Management, (2394-2403)
  36. ACM
    Schett M and Danezis G Embedding a Deterministic BFT Protocol in a Block DAG Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing, (177-186)
  37. ACM
    Ammar M, Crispo B, De Oliveira Nunes I and Tsudik G Delegated attestation Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (37-47)
  38. Lawrence T, Li F, Ali I, Kpiebaareh M, Haruna C and Christopher T (2021). An HMAC-based authentication scheme for network coding with support for error correction and rogue node identification, Journal of Systems Architecture: the EUROMICRO Journal, 116:C, Online publication date: 1-Jun-2021.
  39. Chen D, Yuan H, Hu S, Wang Q and Wang C (2020). BOSSA: A Decentralized System for Proofs of Data Retrievability and Replication, IEEE Transactions on Parallel and Distributed Systems, 32:4, (786-798), Online publication date: 1-Apr-2021.
  40. Altarawneh A, Sun F, Brooks R, Hambolu O, Yu L and Skjellum A (2021). Availability analysis of a permissioned blockchain with a lightweight consensus protocol, Computers and Security, 102:C, Online publication date: 1-Mar-2021.
  41. ACM
    Suntaxi G, Ghazi A and Böhm K (2020). Preserving Secrecy in Mobile Social Networks, ACM Transactions on Cyber-Physical Systems, 5:1, (1-29), Online publication date: 31-Jan-2021.
  42. Yin F, Lu R, Zheng Y, Tang X and Jiang Q (2021). Achieve Efficient and Privacy-Preserving Compound Substring Query over Cloud, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  43. Arockiasamy J, Benjamin L, Vaidyanathan R and Conti V (2021). Beyond Statistical Analysis in Chaos-Based CSPRNG Design, Security and Communication Networks, 2021, Online publication date: 1-Jan-2021.
  44. ACM
    Al-Ahmadi W, Aljahdali A and Munshi A An Efficient and Secure Hiding Technique for Fingerprint Authentication Based on DNA Sequence Proceedings of the 4th International Conference on Future Networks and Distributed Systems, (1-5)
  45. ACM
    Armknecht F, Walther P, Tsudik G, Beck M and Strufe T ProMACs: Progressive and Resynchronizing MACs for Continuous Efficient Authentication of Message Streams Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, (211-223)
  46. ACM
    Joque J and Haque S Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity Proceedings of the New Security Paradigms Workshop 2020, (99-110)
  47. ACM
    Kapusta K, Rambaud M and Memmi G Revisiting Shared Data Protection Against Key Exposure Proceedings of the 15th ACM Asia Conference on Computer and Communications Security, (165-177)
  48. Dai W, Gu X and Teng Y A Supervised Anonymous Issuance Scheme of Central Bank Digital Currency Based on Blockchain Algorithms and Architectures for Parallel Processing, (475-493)
  49. ACM
    Chatterjee U, Chatterjee S, Mukhopadhyay D and Chakraborty R (2020). Machine Learning Assisted PUF Calibration for Trustworthy Proof of Sensor Data in IoT, ACM Transactions on Design Automation of Electronic Systems, 25:4, (1-21), Online publication date: 2-Sep-2020.
  50. ACM
    Boshrooyeh S, Küpçü A and Özkasap Ö (2020). Privado, ACM Transactions on Privacy and Security, 23:3, (1-36), Online publication date: 31-Aug-2020.
  51. Rahnama S, Gupta S, Qadah T, Hellings J and Sadoghi M (2020). Scalable, resilient, and configurable permissioned blockchain fabric, Proceedings of the VLDB Endowment, 13:12, (2893-2896), Online publication date: 1-Aug-2020.
  52. Mouris D and Tsoutsos N Pythia Proceedings of the 57th ACM/EDAC/IEEE Design Automation Conference, (1-6)
  53. Carvalho H, Cruz D, Pontes R, Paulo J and Oliveira R On the Trade-Offs of Combining Multiple Secure Processing Primitives for Data Analytics Distributed Applications and Interoperable Systems, (3-20)
  54. Cao Y, Zhao Y, Li J, Lin R, Zhang J and Chen J (2020). Multi-Tenant Provisioning for Quantum Key Distribution Networks With Heuristics and Reinforcement Learning: A Comparative Study, IEEE Transactions on Network and Service Management, 17:2, (946-957), Online publication date: 1-Jun-2020.
  55. Viejo A and Sánchez D (2020). Secure monitoring in IoT-based services via fog orchestration, Future Generation Computer Systems, 107:C, (443-457), Online publication date: 1-Jun-2020.
  56. ACM
    Li J, Yang Z, Ren Y, Lee P and Zhang X Balancing storage efficiency and data confidentiality with tunable encrypted deduplication Proceedings of the Fifteenth European Conference on Computer Systems, (1-15)
  57. Shen X, Zhu L, Xu C, Sharif K and Lu R (2020). A privacy-preserving data aggregation scheme for dynamic groups in fog computing, Information Sciences: an International Journal, 514:C, (118-130), Online publication date: 1-Apr-2020.
  58. Rachid M, Riley R and Malluhi Q (2020). Enclave-based oblivious RAM using Intel’s SGX, Computers and Security, 91:C, Online publication date: 1-Apr-2020.
  59. Iqbal H and Krawec W (2020). Semi-quantum cryptography, Quantum Information Processing, 19:3, Online publication date: 10-Feb-2020.
  60. ACM
    Maivizhi R and Yogesh P Concealed Multidimensional Data Aggregation in Big Data Wireless Sensor Networks Proceedings of the 7th ACM IKDD CoDS and 25th COMAD, (19-27)
  61. Shao Z, Kosari S, Anoos R, Sheikholeslami S, Dayap J and Lopez Gutierrez R (2020). Outer-Convex Dominating Set in the Corona of Graphs as Encryption Key Generator, Complexity, 2020, Online publication date: 1-Jan-2020.
  62. Chen Y, Tang C, Yi Z and Lopez Gutierrez R (2020). A Novel Image Encryption Scheme Based on PWLCM and Standard Map, Complexity, 2020, Online publication date: 1-Jan-2020.
  63. Du L, Li K, Liu Q, Wu Z and Zhang S (2020). Dynamic multi-client searchable symmetric encryption with support for boolean queries, Information Sciences: an International Journal, 506:C, (234-257), Online publication date: 1-Jan-2020.
  64. Galbraith S, Petit C and Silva J (2019). Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems, Journal of Cryptology, 33:1, (130-175), Online publication date: 1-Jan-2020.
  65. ACM
    Jackson D, Cremers C, Cohn-Gordon K and Sasse R Seems Legit Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, (2165-2180)
  66. Gong G, He M, Rohit R and Yi Y U-EPS: An Ultra-small and Efficient Post-quantum Signature Scheme Foundations and Practice of Security, (261-272)
  67. Nautsch A, Jiménez A, Treiber A, Kolberg J, Jasserand C, Kindt E, Delgado H, Todisco M, Hmani M, Mtibaa A, Abdelraheem M, Abad A, Teixeira F, Matrouf D, Gomez-Barrero M, Petrovska-Delacrétaz D, Chollet G, Evans N, Schneider T, Bonastre J, Raj B, Trancoso I and Busch C (2022). Preserving privacy in speaker and speech characterisation, Computer Speech and Language, 58:C, (441-480), Online publication date: 1-Nov-2019.
  68. ACM
    Duan L, Li Y and Liao L Non-interactive Certificate Update Protocol for Efficient Authentication in IoT Proceedings of the 9th International Conference on the Internet of Things, (1-8)
  69. ACM
    Radian R and Sattath O Semi-Quantum Money Proceedings of the 1st ACM Conference on Advances in Financial Technologies, (132-146)
  70. Lopez-Millan G, Marin-Lopez R and Pereniguez-Garcia F (2022). Towards a standard SDN-based IPsec management framework, Computer Standards & Interfaces, 66:C, Online publication date: 1-Oct-2019.
  71. Sudo H, Jimbo M, Nuida K and Shimizu K (2019). Secure Wavelet Matrix, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 16:5, (1675-1684), Online publication date: 1-Sep-2019.
  72. Li X, Zhu Y, Wang J and Zhang J (2019). Efficient and secure multi-dimensional geometric range query over encrypted data in cloud, Journal of Parallel and Distributed Computing, 131:C, (44-54), Online publication date: 1-Sep-2019.
  73. El Shafie A, Al-Dhahir N, Ding Z and Hamila R (2019). On the Delay/Throughput-Security Tradeoff in Wiretap TDMA Networks With Buffered Nodes, IEEE Transactions on Wireless Communications, 18:8, (3948-3960), Online publication date: 1-Aug-2019.
  74. Hu W, Yao Y, Zhou D, Zheng Q and Choo K (2019). A Novel Image Secret Sharing Scheme without Third-Party Scrambling Method, Mobile Networks and Applications, 24:4, (1317-1335), Online publication date: 1-Aug-2019.
  75. ACM
    Xie Q, Hou Y, Cheng K, Dagher G, Wang L and Yu S Flexibly and Securely Shape Your Data Disclosed to Others Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, (160-167)
  76. Jiang H, Wang H, Zheng Z and Xu Q (2019). Privacy preserved wireless sensor location protocols based on mobile edge computing, Computers and Security, 84:C, (393-401), Online publication date: 1-Jul-2019.
  77. Dachman-Soled D, Gordon S, Liu F, O'neill A and Zhou H (2019). Leakage Resilience from Program Obfuscation, Journal of Cryptology, 32:3, (742-824), Online publication date: 1-Jul-2019.
  78. ACM
    Ferretti L, Marchetti M and Colajanni M (2019). Fog-based Secure Communications for Low-power IoT Devices, ACM Transactions on Internet Technology, 19:2, (1-21), Online publication date: 31-May-2019.
  79. Gheorghiu A, Kapourniotis T and Kashefi E (2019). Verification of Quantum Computation, Theory of Computing Systems, 63:4, (715-808), Online publication date: 1-May-2019.
  80. Bogatov D, Kollios G and Reyzin L (2019). A comparative evaluation of order-revealing encryption schemes and secure range-query protocols, Proceedings of the VLDB Endowment, 12:8, (933-947), Online publication date: 1-Apr-2019.
  81. Choi S, Katz J, Schröder D, Yerukhimovich A and Zhou H (2019). (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens, Journal of Cryptology, 32:2, (459-497), Online publication date: 1-Apr-2019.
  82. Zhou M, Wang Q, Ren K, Koutsonikolas D, Su L and Chen Y (2019). Dolphin, IEEE Transactions on Mobile Computing, 18:3, (560-573), Online publication date: 1-Mar-2019.
  83. Chang J, Ji Y, Xu M and Xue R (2019). General transformations from single-generation to multi-generation for homomorphic message authentication schemes in network coding, Future Generation Computer Systems, 91:C, (416-425), Online publication date: 1-Feb-2019.
  84. ACM
    Unruh D (2019). Quantum relational Hoare logic, Proceedings of the ACM on Programming Languages, 3:POPL, (1-31), Online publication date: 2-Jan-2019.
  85. Wang Q, Du M, Chen X, Chen Y, Zhou P, Chen X and Huang X (2018). Privacy-Preserving Collaborative Model Learning: The Case of Word Vector Training, IEEE Transactions on Knowledge and Data Engineering, 30:12, (2381-2393), Online publication date: 1-Dec-2018.
  86. ACM
    Martins P, Sousa L and Mariano A (2017). A Survey on Fully Homomorphic Encryption, ACM Computing Surveys, 50:6, (1-33), Online publication date: 30-Nov-2018.
  87. ACM
    Dziembowski S, Faust S and Hostáková K General State Channel Networks Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (949-966)
  88. ACM
    Behnia R, Ozmen M, Yavuz A and Rosulek M TACHYON Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1855-1867)
  89. ACM
    Vargas L, Hazarika G, Culpepper R, Butler K, Shrimpton T, Szajda D and Traynor P Mitigating Risk while Complying with Data Retention Laws Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (2011-2027)
  90. ACM
    Fang S, Markwood I, Liu Y, Zhao S, Lu Z and Zhu H No Training Hurdles Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, (1747-1760)
  91. Li Y, Zhou F, Qin Y, Lin M and Xu Z (2018). Integrity-verifiable conjunctive keyword searchable encryption in cloud storage, International Journal of Information Security, 17:5, (549-568), Online publication date: 1-Oct-2018.
  92. ACM
    Fujdiak R, Blazek P, Mikhaylov K, Malina L, Mlynek P, Misurec J and Blazek V On Track of Sigfox Confidentiality with End-to-End Encryption Proceedings of the 13th International Conference on Availability, Reliability and Security, (1-6)
  93. Lin D, Hilbert N, Storer C, Jiang W and Fan J (2018). UFace, Computers and Security, 77:C, (627-641), Online publication date: 1-Aug-2018.
  94. Demertzis I, Talapatra R and Papamanthou C (2018). Efficient searchable encryption through compression, Proceedings of the VLDB Endowment, 11:11, (1729-1741), Online publication date: 1-Jul-2018.
  95. Canteaut A, Carpov S, Fontaine C, Lepoint T, Naya-Plasencia M, Paillier P and Sirdey R (2018). Stream Ciphers, Journal of Cryptology, 31:3, (885-916), Online publication date: 1-Jul-2018.
  96. Wang S, Dinh T, Lin Q, Xie Z, Zhang M, Cai Q, Chen G, Ooi B and Ruan P (2018). Forkbase, Proceedings of the VLDB Endowment, 11:10, (1137-1150), Online publication date: 1-Jun-2018.
  97. ACM
    Dalskov A and Orlandi C Can You Trust Your Encrypted Cloud? Proceedings of the 2018 on Asia Conference on Computer and Communications Security, (343-355)
  98. ACM
    Bartolucci S, Bernat P and Joseph D SHARVOT Proceedings of the 1st International Workshop on Emerging Trends in Software Engineering for Blockchain, (30-34)
  99. ACM
    Teruya T A Note on Subgroup Security in Pairing-Based Cryptography Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, (35-43)
  100. ACM
    Yang K, Forte D and Tehranipoor M (2018). ReSC, ACM Transactions on Design Automation of Electronic Systems, 23:3, (1-27), Online publication date: 18-Apr-2018.
  101. ACM
    Demertzis I, Papadopoulos S, Papapetrou O, Deligiannakis A, Garofalakis M and Papamanthou C (2018). Practical Private Range Search in Depth, ACM Transactions on Database Systems, 43:1, (1-52), Online publication date: 11-Apr-2018.
  102. ACM
    Férée H, Hym S, Mayero M, Moyen J and Nowak D Formal proof of polynomial-time complexity with quasi-interpretations Proceedings of the 7th ACM SIGPLAN International Conference on Certified Programs and Proofs, (146-157)
  103. Jannati H and Bahrak B (2017). An Oblivious Transfer Protocol Based on Elgamal Encryption for Preserving Location Privacy, Wireless Personal Communications: An International Journal, 97:2, (3113-3123), Online publication date: 1-Nov-2017.
  104. ACM
    Bellare M, Jaeger J and Len J Better Than Advertised Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (891-906)
  105. ACM
    Li Y and Schäge S No-Match Attacks and Robust Partnering Definitions Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (1343-1360)
  106. ACM
    Berndt S and Liśkiewicz M Algorithm Substitution Attacks from a Steganographic Perspective Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (1649-1660)
  107. ACM
    Dang H, Huang Y and Chang E Evading Classifiers by Morphing in the Dark Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, (119-133)
  108. ACM
    Poh G, Chin J, Yau W, Choo K and Mohamad M (2017). Searchable Symmetric Encryption, ACM Computing Surveys, 50:3, (1-37), Online publication date: 9-Oct-2017.
  109. ACM
    Chatterjee U, Chakraborty R and Mukhopadhyay D (2017). A PUF-Based Secure Communication Protocol for IoT, ACM Transactions on Embedded Computing Systems, 16:3, (1-25), Online publication date: 31-Aug-2017.
  110. ACM
    Picek S Evolutionary computation and cryptology Proceedings of the Genetic and Evolutionary Computation Conference Companion, (1066-1093)
  111. Xue K, Li S, Hong J, Xue Y, Yu N and Hong P (2017). Two-Cloud Secure Database for Numeric-Related SQL Range Queries With Privacy Preserving, IEEE Transactions on Information Forensics and Security, 12:7, (1596-1608), Online publication date: 1-Jul-2017.
  112. Wang W, Vong C, Yang Y and Wong P (2017). Encrypted image classification based on multilayer extreme learning machine, Multidimensional Systems and Signal Processing, 28:3, (851-865), Online publication date: 1-Jul-2017.
  113. Picek S, Sisejkovic D and Jakobovic D (2017). Immunological algorithms paradigm for construction of Boolean functions with good cryptographic properties, Engineering Applications of Artificial Intelligence, 62:C, (320-330), Online publication date: 1-Jun-2017.
  114. Ahmad M, Khurana S, Singh S and Alsharari H (2017). A Simple Secure Hash Function Scheme Using Multiple Chaotic Maps, 3D Research, 8:2, (1-15), Online publication date: 1-Jun-2017.
  115. ACM
    Demertzis I and Papamanthou C Fast Searchable Encryption With Tunable Locality Proceedings of the 2017 ACM International Conference on Management of Data, (1053-1067)
  116. Yang L, Huang G, Feng J and Xu L (2017). Parallel GNFS algorithm integrated with parallel block Wiedemann algorithm for RSA security in cloud computing, Information Sciences: an International Journal, 387:C, (254-265), Online publication date: 1-May-2017.
  117. ACM
    Applebaum B, Avron J and Brzuska C (2017). Arithmetic Cryptography, Journal of the ACM, 64:2, (1-74), Online publication date: 30-Apr-2017.
  118. ACM
    Song J, Yang F, Choo K, Zhuang Z and Wang L (2017). SIPF, ACM Transactions on Embedded Computing Systems, 16:2, (1-18), Online publication date: 14-Apr-2017.
  119. Hu G, Xiao D, Wang Y and Xiang T (2017). An image coding scheme using parallel compressive sensing for simultaneous compression-encryption applications, Journal of Visual Communication and Image Representation, 44:C, (116-127), Online publication date: 1-Apr-2017.
  120. Fuchsbauer G, Gay R, Kowalczyk L and Orlandi C Access Control Encryption for Equality, Comparison, and More Proceedings, Part II, of the 20th IACR International Conference on Public-Key Cryptography --- PKC 2017 - Volume 10175, (88-118)
  121. Baek J, Hableel E, Byon Y, Wong D, Jang K and Yeo H (2017). How to Protect ADS-B, IEEE Transactions on Intelligent Transportation Systems, 18:3, (690-700), Online publication date: 1-Mar-2017.
  122. Zhang Y, Xu C, Liang X, Li H, Mu Y and Zhang X (2017). Efficient Public Verification of Data Integrity for Cloud Storage Systems from Indistinguishability Obfuscation, IEEE Transactions on Information Forensics and Security, 12:3, (676-688), Online publication date: 1-Mar-2017.
  123. ACM
    Hoang T, Yavuz A and Guajardo J Practical and secure dynamic searchable encryption via oblivious access on distributed data structure Proceedings of the 32nd Annual Conference on Computer Security Applications, (302-313)
  124. Zhou F, Li Y, Liu A, Lin M and Xu Z Integrity Preserving Multi-keyword Searchable Encryption for Cloud Computing Proceedings of the 10th International Conference on Provable Security - Volume 10005, (153-172)
  125. ACM
    Jakobsen J and Orlandi C On the CCA (in)Security of MTProto Proceedings of the 6th Workshop on Security and Privacy in Smartphones and Mobile Devices, (113-116)
  126. Camenisch J, Enderlein R and Maurer U Memory Erasability Amplification Proceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 9841, (104-125)
  127. Baum C, Damgård I, Larsen K and Nielsen M How to Prove Knowledge of Small Secrets Proceedings, Part III, of the 36th Annual International Cryptology Conference on Advances in Cryptology --- CRYPTO 2016 - Volume 9816, (478-498)
  128. ACM
    Picek S Evolutionary Computation and Cryptology Proceedings of the 2016 on Genetic and Evolutionary Computation Conference Companion, (883-909)
  129. ACM
    Dou Y, Zeng K, Li H, Yang Y, Gao B, Guan C, Ren K and Li S P2-SAS Proceedings of the 17th ACM International Symposium on Mobile Ad Hoc Networking and Computing, (321-330)
  130. Kolokotronis N, Katsiotis A and Kalouptsidis N (2016). Secretly Pruned Convolutional Codes, IEEE Transactions on Information Forensics and Security, 11:7, (1500-1514), Online publication date: 1-Jul-2016.
  131. Canteaut A, Carpov S, Fontaine C, Lepoint T, Naya-Plasencia M, Paillier P and Sirdey R Stream Ciphers Revised Selected Papers of the 23rd International Conference on Fast Software Encryption - Volume 9783, (313-333)
  132. ACM
    Ghali C, Schlosberg M, Tsudik G and Wood C Interest-Based Access Control for Content Centric Networks Proceedings of the 2nd ACM Conference on Information-Centric Networking, (147-156)
  133. Dinh T, Saxena P, Chang E, Ooi B and Zhang C M2R Proceedings of the 24th USENIX Conference on Security Symposium, (447-462)
  134. ACM
    Papadopoulos S, Cormode G, Deligiannakis A and Garofalakis M (2014). Lightweight Query Authentication on Streams, ACM Transactions on Database Systems, 39:4, (1-45), Online publication date: 30-Dec-2015.
  135. ACM
    Yang Z, Li J, Ren Y and Lee P Tunable Encrypted Deduplication with Attack-Resilient Key Management, ACM Transactions on Storage, 0:0
Contributors
  • University of Maryland, College Park
  • Bar-Ilan University

Recommendations

Reviews

Carla Iran SanchezAguilar

Introduction to modern cryptography offers its readers an in-depth, rigorous account of history, formal concepts, and definitions used today in the field of cryptography. Unlike other introductory texts, the authors strongly emphasize the importance of the mathematical foundations of cryptography. The book is divided into three parts. The first part explores background and some basic formal definitions and principles about cryptography. Some of the basic mathematical foundations are described along with some of the most famous ciphers. The second part of the book focuses on symmetric or private-key encryption. The authors formally define the concept of computational security, present alternatives to constructing secure encryption schemes, and then proceed to define secrecy and integrity, analyzing the construction of authentication codes and binding these concepts to encryption. Furthermore, in chapter 5 the reader gets important insights to the challenges of hash functions and their applications. When reaching the final chapters of this section, the authors have provided the reader with a complete set of definitions, theorems, proofs, and algorithms: enough to understand the dynamics of symmetric-key encryption. The main topic of the third part is private-key or asymmetric encryption. This section handles public-key encryption with the same level of rigor and detail as the rest of the book. The first chapters present some background concepts, along with factoring problems and applications. Then, key management issues are introduced, before covering the schemes most common to public-key encryption and digital signatures. The authors commit themselves to reinforcing the material presented in their text by offering challenging and insightful exercises at the end of each chapter. As a lone reader, I wish there were a forum for discussing the exercises and exchanging ideas with other readers. I could imagine that being part of a classroom could provide the sort of discussions that excite the student's intellect. The book is mostly suited for people seriously interested in cryptography. It is adequate for advanced undergraduate and graduate courses in the fields of computer science and mathematics. Although the authors try to explain the topic in a simple, comprehensible manner, a strong mathematical background is required to get the most out of the concepts, schemes, and strategies presented. More reviews about this item: Amazon Online Computing Reviews Service

G. Smith

The volume is intended as a textbook, which also includes classroom exercises. As a result, it can be evaluated on that basis and then compared to other works in the field. The question is why write another textbook on cryptography__?__ The authors note that they wrote this new textbook to be both rigorous and accessible for the study of modern cryptography. Let me define modern cryptography as that scientific discipline which began in the 1980s. In terms of definition, modern cryptography is characterized by the ability to describe security in order to design it. In modern cryptography, the assumptions are clearly stated and are unambiguously defined; prior to modern scholarship, cryptography was more of an art than a science for students to learn. Since the volume is addressed to students, there is an emphasis on practice. The student should understand discrete math as well as have exposure to proofs at the college level, an upper-level math course, or a course on algorithms or computability theory. The work is geared toward a one-semester 35-hour undergraduate course. The core components of the volume are highlighted with stars; however, there is added material for a more detailed explanation of the content or flexibly for extra work if needed. Helpfully, the authors point out how modern cryptography is to be defined. To wit, "modern cryptography involves the study of mathematical techniques for securing digital information, systems, and distributed computations against adversarial attacks" (p. 3). Post 1980s modern cryptography enabled the rigorous study of cryptography as a science and a mathematical discipline as opposed to the art of classical cryptography. The major shift in cryptography also has spread to the ordinary computer user who utilizes the discipline for passwords and financial transactions. Classical cryptography prioritizes private encryption wherein two parties share a key that they use to communicate securely. The assumption is then that an eavesdropper can monitor the transmissions, but without the key they cannot understand the private messages. Over time, another common setting of private-key cryptography is that a single user stores data securely and continuously. The syntax of encryption encrypts a message and the decrypts are the resulting cipher text using the same key that yields the original message. In the late 19th century, Auguste Kerckhoffs developed the principle demanding that "security rely solely on secrecy of the key" (p. 7). However, the key-space principle noted above provides a necessary condition for security, but not a sufficient one. On the other hand, the mono-alphabetic substitution cipher does ensure sufficiency. The key is arbitrary so that decryption is possible. Nonetheless, the mono-alphabetic substitution cipher can be quickly broken; in fact, to demonstrate the utility of their key points, one of the strengths of the volume is that a handy exercise is placed directly after making these points. In this case, the student can perform an improved attack on the aforementioned shift cipher through the use of the supplied letter-frequency table (Figure 1.3). The Vigenère (poly-alphabetic shift) cipher thwarts mono-alphabetic analysis where the key defines a mapping that is applied on blocks of plaintext characters. This historic cypher was invented in the 16th century, thought to be unbreakable, and indeed it was until a systematic attack on the scheme was devised hundreds of years later. In summary, these few historical ciphers illustrate important lessons. Arguably, the most important lesson is that designing secure ciphers is arduous. Far more complex ciphers have been designed and yet all historical schemes have been broken. The core of the work is in modern cryptography, which is a science as opposed to the bulk of historical examples that were more of an art. The practice of the art allowed the scheme to be broken, fixed, or patched, and the process repeated. There was no agreed upon manner to secure a scheme. Modern cryptography now aspires to provide rigorous proof of a secure construction and the means to do so. In order to articulate these proofs, formal definitions pinpoint exactly what secure means. The emphasis on definitions, assumptions, and proofs distinguishes modern cryptography from the historical art. The actual test of a volume of this type's worth is to compare it to others in the same genre. The work is comprehensive, rigorous, and yet accessible for dedicated students. In the case of this text, the work may be favorably compared to two other standard works in the field [1,2]. More reviews about this item: Amazon Online Computing Reviews Service

Alasdair McAndrew

In contrast to many introductory cryptography texts, this one concentrates on the theory of cryptography: what is in fact meant by security__?__ How can security be measured__?__ What are the conditions under which a cryptosystem (or hash function, or any other cryptographic primitive) can be said to be secure__?__ The book is in three sections: the first consists of two short chapters and is introductory and discursive; the second (chapters 3 to 7) investigates security as applied to secret-key cryptography; and the third discusses public key cryptography. The language of probability pervades this text, as it should. For example, suppose one of two messages is encrypted and the ciphertext passed to an "adversary." If the adversary cannot determine which of the two plaintexts corresponds to the ciphertext with probability greater than 1/2, the system is "perfectly secure." A slightly weaker definition, but more useful in practice, is to define security as the probability of the adversary choosing the correct plaintext being no greater than 1/2 + negl( n ), where negl is a "negligible function" (one that is asymptotically less than the reciprocal of any positive polynomial, such as 2- n ), and n is a parameter defined in terms of the lengths of the plaintext and ciphertext. There are discussions on security based on information held by the adversary: chosen plaintext attack (CPA)-secure and chosen ciphertext attack (CCA)-secure. It is shown, for example, what it means for a cryptosystem to be secure against such an attack. The five chapters of the Part 2 expand upon this definition (which is very clearly and precisely stated) and its ramifications to hash functions, secret-key systems, encryption modes, and other cryptographic primitives. Chapters 6 and 7 introduce some practical systems: the data encryption standard (DES) and its variants; the advanced encryption standard (AES); the hash functions MD5 and SHA-0 to SHA-3; and pseudorandom generators. Although DES might seem to have been discussed to death in pretty much every cryptography text published in the last few decades, the authors provide here a refreshingly different approach: one in which the various building blocks (in particular the Feistel structure) are each carefully analyzed for the security they provide. This means, for example, that there can be a discussion on attacking DES with fewer rounds, as well as an (optional) section on differential and linear cryptanalysis. The text also clearly differentiates theoretical from practical attacks. The birthday attack for hash functions, in its most theoretical form, requires a great deal of memory, which is noted to be "in general, a scarcer resource than time." For such an attack to be practical, some means must be found to minimize the storage requirements, which leads to "small-space birthday attacks." This is in fact only a small part of the text, but it nicely illustrates the book's structure, its attention to detail, and its rigor. The second half of the text investigates public-key cryptography, again defining security probabilistically, and very carefully showing how that definition can be used to show that a public-key system is secure. One example, which neatly sums up the flavor of the book, is theorem 11.8, which states: "If the DDH problem is hard relative to G , then the El Gamal encryption scheme is CPA-secure." Here G is the polynomial-time algorithm that outputs a description of a cyclic group of order n and a generator, over which the El Gamal system is defined. DDH is the decisional Diffie-Hellman problem, and its "hardness" is again carefully described using probability. A particularly elegant example is the RSA cryptosystem, which would seem to be secure simply because of the difficulty of factoring large numbers. But this is not true; since RSA is deterministic (same input produces the same output), in its basic form it is trivially insecure against a chosen plaintext attack. This raises the question: how secure is RSA__?__ This text carefully investigates security assumptions and foundations (using the random oracle model) to precisely define how a public-key system can be said to be secure. Examples of cryptosystems are scattered throughout the book-DES, AES, RSA, El Gamal, Rabin, Paillier, and Goldwasser-Micali, for example-but in fact these are not the main aim of the text. This text is not a compendium of cryptosystems, with a nod in the direction of their security, but instead sits at a more profoundly fundamental level. It is, as the authors are careful to point out, a text about the theory of modern cryptography. Cryptography can be an abstruse science: notationally complex and with definitions requiring particular precision and care. A cryptosystem can't be said to be "secure" without a firm foundation as to the meaning of security, and the context in which it is being applied. It is easy for authors to be confused in their discussions and imprecise in their reasoning. I think that Katz and Lindell have done a remarkable job in maintaining clarity and rigor, without sacrificing approachability. The text is even pleasantly chatty and discursive when needed. The authors aim to be "accessible," and I think the text is so, given the subtlety of its material. For a course of study, it would be suited to upper undergraduate or beginning postgraduate students: a mathematics student (or indeed, anybody else with some mathematics background) wishing to come to grips with modern cryptographic theory could do a great deal worse than this text. More reviews about this item: Amazon Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.