In this free, 500+ pages book delivered with the CrypTool applications you will find predominantly mathematically oriented information on learning, using and experimenting cryptographic procedures. The 12th edition is a major update of the book.
The main chapters have been written by various authors and are independent from each another.
- The first chapter explains the principles of symmetric and asymmetric encryption, and describes shortly the current decryption records of modern symmetric algorithms. It introduces definitions for their resistibility, and shortly explains the importance of cryptology.
- Because of didactical reasons, the second chapter gives an exhaustive overview about paper and pencil encryption methods.
- Chapter three is dedicated to the fascinating topic of prime numbers.
- In chapter 4, modular arithmetic and elementary number theory are introduced, and applied in many examples including the RSA procedure.
- By reading chapter 5 you will gain an insight into the mathematical ideas and concepts behind modern cryptography.
- Chapter 6 gives an overview about the status of attacks against modern hash algorithms and is then shortly devoted to digital signatures, which are an essential component of e-business applications.
- Chapter 7 describes elliptic curves: Compared to RSA, they provide a very efficient alternative for the hardware based generation of digital signatures.
- Chapter 8 introduces Boolean algebra, which is the foundation for most modern, symmetric encryption algorithms as these operate on bit streams and bit groups. Principal construction methods are described and implemented in SageMath.
- Chapter 9 describes homomorphic crypto functions which got special attention in the course of cloud computing.
- Chapter 10 provides a broad picture and comparison about the currently best algorithms for (a) computing discrete logarithms in various groups, for (b) the status of the factorization problem, and for (c) elliptic curves. This survey was put together as a reaction to a provocative talk at the Black Hat Conference 2013 which caused some uncertainty by incorrectly extrapolating progress at finite fields of small characteristics to the fields used in real world.
- Chapter 11 discusses the threats for existing cryptographic methods and introduces alternative research approaches (post-quantum crypto) to achieve long-term security of cryptographic schemes.
For many algorithms there are small and run capable code samples in Python and SageMath, or they are further explained with one of the CrypTool variants.