Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
- Length: 358 pages
- Edition: 1
- Language: English
- Publisher: Packt Publishing
- Publication Date: 2022-03-03
- ISBN-10: 1789617138
- ISBN-13: 9781789617139
- Sales Rank: #151817 (See Top 100 Books)
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity career
Key Features
- Learn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptography
- Explore vulnerability and new logical attacks on the most-used algorithms
- Understand the practical implementation of algorithms and protocols in cybersecurity applications
Book Description
Cryptography Algorithms is designed to help you get up and running with modern cryptography algorithms. You’ll not only explore old and modern security practices but also discover practical examples of implementing them effectively.
The book starts with an overview of cryptography, exploring key concepts including popular classical symmetric and asymmetric algorithms, protocol standards, and more. You’ll also cover everything from building crypto codes to breaking them. In addition to this, the book will help you to understand the difference between various types of digital signatures. As you advance, you will become well-versed with the new-age cryptography algorithms and protocols such as public and private key cryptography, zero-knowledge protocols, elliptic curves, quantum cryptography, and homomorphic encryption. Finally, you’ll be able to apply the knowledge you’ve gained with the help of practical examples and use cases.
By the end of this cryptography book, you will be well-versed with modern cryptography and be able to effectively apply it to security applications.
What you will learn
- Understand key cryptography concepts, algorithms, protocols, and standards
- Break some of the most popular cryptographic algorithms
- Build and implement algorithms efficiently
- Gain insights into new methods of attack on RSA and asymmetric encryption
- Explore new schemes and protocols for blockchain and cryptocurrency
- Discover pioneering quantum cryptography algorithms
- Perform attacks on zero-knowledge protocol and elliptic curves
- Explore new algorithms invented by the author in the field of asymmetric, zero-knowledge, and cryptocurrency
Who this book is for
This hands-on cryptography book is for IT professionals, cybersecurity enthusiasts, or anyone who wants to develop their skills in modern cryptography and build a successful cybersecurity career. Working knowledge of beginner-level algebra and finite fields theory is required.
Cryptography Algorithms Contributors About the author About the reviewer Preface Who this book is for What this book covers To get the most out of this book Download the color images Conventions used Get in touch Share Your Thoughts Section 1: A Brief History and Outline of Cryptography Chapter 1: Deep Diving into Cryptography An introduction to cryptography Binary numbers, ASCII code, and notations Fermat's Last Theorem, prime numbers, and modular mathematics A brief history and a panoramic overview of cryptographic algorithms Rosetta Stone Caesar cipher ROT13 The Beale cipher The Vernam cipher Notes on security and computation Summary Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption) Chapter 2: Introduction to Symmetric Encryption Notations and operations in Boolean logic DES algorithms Simple DES DES Triple DES DESX AES Rijndael Description of AES Attacks and vulnerabilities in AES Summary Chapter 3: Asymmetric Encryption Introduction to asymmetric encryption The pioneers The Diffie-Hellman algorithm The discrete logarithm Explaining the D-H algorithm Analyzing the algorithm Possible attacks and cryptanalysis on the D-H algorithm RSA Explaining RSA Analyzing RSA Conventional attacks on the algorithm The application of RSA to verify international treaties Unconventional attacks PGP The ElGamal algorithm Summary Chapter 4: Introducing Hash Functions and Digital Signatures A basic explanation of hash functions Overview of the main hash algorithms Logic and notations to implement hash functions Explanation of the SHA-1 algorithm Notes and example on SHA-1 Authentication and digital signatures RSA digital signatures Digital signatures with the ElGamal algorithm Blind signatures Summary Section 3: New Cryptography Algorithms and Protocols Chapter 5: Introduction to Zero-Knowledge Protocols The main scenario of a ZKP – the digital cave Non-interactive ZKPs Schnorr's interactive ZKP An introduction to zk-SNARKs – spooky moon math Zk-SNARKs in Zcash cryptocurrency One-round ZKP ZK13 – a ZKP for authentication and key exchange Summary Chapter 6: New Algorithms in Public/Private Key Cryptography The genesis of the MB09 algorithm Introducing the MB09 algorithm An explanation of MB09 Introducing the MBXI algorithm A numerical example of MBXI Unconventional attacks on RSA Digital signatures on MBXI A direct signature method in MBXI The appendix signature method with MBXI A mathematical demonstration of the MBXI digital signature algorithm The evolution of MB09 and MBXI – an introduction to MBXX An explanation of the MBXX protocol Summary Chapter 7: Elliptic Curves An overview of elliptic curves Operations on elliptic curves Scalar multiplication Implementing the D-H algorithm on elliptic curves Elliptic curve secp256k1 – the Bitcoin digital signature Step 1 – Generating keys Step 2 – Performing the digital signature in secp256k1 Step 3 – Verifying the digital signature A numerical exercise on a digital signature on secp256k1 Attacks on EDCSA and the security of elliptic curves Step 1 – Discovering the random key, [k] Step 2 – Recovering the private key, [d] Considerations about the future of ECC Summary Chapter 8: Quantum Cryptography Introduction to Q-Mechanics and Q-Cryptography An imaginary experiment to understand the elements of Q-Mechanics Step 1 – Superposition Step 2 – The indetermination process Step 3 – Spin and entanglement Q-Cryptography Quantum key distribution – BB84 Step 1 – Initializing the quantum channel Step 2 – Transmitting the photons Step 3 – Determining the shared key Analysis attack and technical issues Quantum computing Shor's algorithm Step 1 – Initializing the qubits Step 2 – Choosing the random number, a Step 3 – Quantum measurement Step 4 – Finding the right candidate, (r) Quantum Fourier Transform Step 5 – Factorizing (n) Notes on Shor's algorithm Post-Q-Cryptography Summary Section 4: Homomorphic Encryption and the Crypto Search Engine Chapter 9: Crypto Search Engine Introduction to CSE – homomorphism Partial homomorphism in RSA Analysis of homomorphic encryption and its implications Math and logic behind search engines Introduction to trees – graph theory Huffman code Hash and Boolean logic CSE explained The innovation in CSE Computational analysis on CSE Example of computational brute-force cracking Applications of CSE Summary Why subscribe? Other Books You May Enjoy Packt is searching for authors like you Share Your Thoughts
Donate to keep this site alive
How to download source code?
1. Go to: https://github.com/PacktPublishing
2. In the Find a repository… box, search the book title: Cryptography Algorithms: A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption
, sometime you may not get the results, please search the main title.
3. Click the book title in the search results.
3. Click Code to download.
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.