Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Cybercryptography : applicable cryptography for cyberspace security
Yan S., Springer International Publishing, New York, NY, 2019. 436 pp. Type: Book (978-3-319725-34-5)
Date Reviewed: Aug 24 2020

Cybersecurity is a major challenge today, as computing systems and networks play an increasingly important role in modern society. Cryptography addresses this problem based on mathematical theory, trying to ensure secure communication over insecure channels.

This book gives an introduction to the theory, methods, and techniques used in modern cryptography. It starts with a general introduction to security in cyberspace, the cybersecurity strategies of some countries, and cryptography. The technical part begins with chapter 2, which introduces mathematical preliminaries. It includes basic algebraic structures (groups, rings, and fields) and topics from number theory (divisibility, arithmetic functions, congruence theory, elliptic curves, and so on). Chapter 3 is about computational preliminaries: classical computability and complexity; quantum information and computation; and quantum computability and complexity. In these chapters, the reader can find formal definitions, propositions and theorems (without proofs), explanatory examples, and historical facts.

The rest of the book is about cryptographic systems. Chapter 4 discusses secret-key cryptography. It starts with a formal definition and intuitive explanation of secret-key and public-key cryptosystems and their comparison. Then it introduces several ciphers illustrated with examples. Chapters 5 through 7 are devoted to public-key cryptography. They introduce some classical intractable problems and discuss cryptosystems based on those problems. These are factoring-based cryptography (based on integer factorization), logarithm-based cryptography (based on discrete logarithm problem), and elliptic curve cryptography (based on the elliptic curve discrete logarithm problem). For each of these cryptosystems, quantum attack possibility is analyzed. This naturally asks a question about the existence of quantum-safe cryptosystems, which is the topic of chapter 8. Chapter 9 briefly addresses offensive uses of cryptography.

The exposition combines the rigor of formal definitions and an easy-to-follow explanatory style based on examples. All sections include problems. Readers of various backgrounds and tastes can try their hand at challenges of varying difficulty, from proving PNP and cracking some FBI Laboratory problem codes to showing Legendre’s conjecture and finding the top ten nations in the Global Cybersecurity Index.

Aside from some typographical, linguistic, and stylistic issues, the book provides a good basic reference for the theory and techniques of modern cryptography.

Reviewer:  Temur Kutsia Review #: CR147044 (2102-0020)
Bookmark and Share
 
Cryptographic Controls (D.4.6 ... )
 
 
Computational Logic (F.4.1 ... )
 
 
Network Architecture And Design (C.2.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Cryptographic Controls": Date
Cryptology: machines, history and methods
Deavours C., Kahn D., Kruh L., Mellen G. (ed), Winkel B. (ed) Artech House, Inc., Norwood, MA,1989. Type: Divisible Book
Jan 1 1992
Transaction security system
Abraham D., Dolan G., Double G., Stevens J. (ed) IBM Systems Journal 30(2): 206-229, 1991. Type: Article
Mar 1 1992
Cryptography for computer security: making the decision
Fisher W. Computers and Security 3(3): 229-233, 1984. Type: Article
Jun 1 1985
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy