Handbook of Applied Cryptography

Chapter 1 Contents

1 Overview of Cryptography
1.1 Introduction
1.2 Information security and cryptography
1.3 Background on functions
1.3.1 Functions (1-1, one-way, trapdoor one-way)
1.3.2 Permutations
1.3.3 Involutions
1.4 Basic terminology and concepts
1.5 Symmetric-key encryption
1.5.1 Overview of block ciphers and stream ciphers
1.5.2 Substitution ciphers and transposition ciphers
1.5.3 Composition of ciphers
1.5.4 Stream ciphers
1.5.5 The key space
1.6 Digital signatures
1.7 Authentication and identification
1.7.1 Identification
1.7.2 Data origin authentication
1.8 Public-key cryptography
1.8.1 Public-key encryption
1.8.2 The necessity of authentication in public-key systems
1.8.3 Digital signatures from reversible public-key encryption
1.8.4 Symmetric-key vs. public-key cryptography
1.9 Hash functions
1.10 Protocols and mechanisms
1.11 Key establishment, management, and certification
1.11.1 Key management through symmetric-key techniques
1.11.2 Key management through public-key techniques
1.11.3 Trusted third parties and public-key certificates
1.12 Pseudorandom numbers and sequences
1.13 Classes of attacks and security models
1.13.1 Attacks on encryption schemes
1.13.2 Attacks on protocols
1.13.3 Models for evaluating security
1.13.4 Perspective for computational security
1.14 Notes and further references
Return to the Table of contents