Many books are available on the subject of cryptography. Most of
these books focus on only the theoretical aspects of cryptography.
Some books that include cryptographic algorithms with practical
programming codes are by this time (i.e., at the preparation of this
book) outdated. Though cryptography is a classical subject in which
often “old is gold,” many new techniques and algorithms have been
developed in recent years. These are the main points that motivated
us to write and edit this book.
In fact, as students for life, we are constantly learning new needs in
our fields of interest. When we were formally enrolled university students
completing our undergraduate and postgraduate studies, we felt
the need for a book that would not only provide details of the theories
and concepts of cryptography, but also provide executable programming
codes that the students would be able to try using their own
computers. It took us a long time to commit to prepare such a book
with both theory and practical codes.
Though some chapters of this book have been contributed by different
authors from different countries, we, the editors, have also made our
personal contributions in many parts. The content is a balanced mixture
of the foundations of cryptography and its practical implementation
with the programming language C++.
Contents
Preface ix
Acknowledgments xi
About the Editors xiii
Contributors xvii
Chapter 1 B asics of Security and Cryptography 1
AL-SAKIB KHAN PATHAN
Chapter 2 C lassical Cryptographic Algorithms 11
SHEIKH SHAUGAT ABDULLAH AND SAIFUL AZAD
Chapter 3 R otor Machine 35
SHEIKH SHAUGAT ABDULLAH AND SAIFUL AZAD
Chapter 4 B lock Cipher 45
TANVEER AHMED, MOHAMMAD ABUL KASHEM,
AND SAIFUL AZAD
Chapter 5 D ata Encryption Standard 57
EZAZUL ISLAM AND SAIFUL AZAD
Chapter 6 A dvanced Encryption Standard 91
ASIF UR RAHMAN, SAEF ULLAH MIAH, AND SAIFUL AZAD
Chapter 7 A symmetric Key Algorithms 127
NASRIN SULTANA AND SAIFUL AZAD
Chapter 8 T he RSA Algorithm 135
SAAD ANDALIB AND SAIFUL AZAD
Chapter 9 E lliptic Curve Cryptography 147
HAFIZUR RAHMAN AND SAIFUL AZAD
Chapter 10 M essage Digest Algorithm 5 183
BAYZID ASHIK HOSSAIN
Chapter 11 S ecure Hash Algorithm 207
SADDAM HOSSAIN MUKTA AND SAIFUL AZAD
Chapter 12 F undamentals of Identity-Based
Cryptography 225
AYMEN BOUDGUIGA, MARYLINE LAURENT, AND MOHAMED HAMDI
Chapter 13 S ymmetric Key Encryption Acceleration
on Heterogeneous Many-Core
Architectures 251
GIOVANNI AGOSTA, ALESSANDRO BARENGHI,
GERARDO PELOSI, AND MICHELE SCANDALE
Chapter 14 M ethods and Algorithms for Fast
Hashing in Data Streaming 299
MARAT ZHANIKEEV
What This Book Is For
The main objective of this book is not only to describe state-of-theart
cryptographic algorithms (alongside classic schemes), but also to
demonstrate how they can be implemented using a programming language,
i.e., C++. As noted before, books that discuss cryptographic
algorithms do not elaborate on implementation issues. Therefore,
a gap between the understanding and the implementation remains
unattained to a large extent. The motivation for this book is to bridge
that gap and to cater to readers in such a way that they will be capable
of developing and implementing their own designed cryptographic algorithm.
What This Book Is Not For
The book is not an encyclopedia-like resource. It is not for those who
are completely outside the related fields, for example, readers with
backgrounds in arts, business, economics, or other such areas. It may
not contain the meanings and details of each technical term mentioned.
While many of the technical matters have been detailed for
easy understanding, some knowledge about computers, networking,
programming, and aspects of computer security may be required.
Familiarity with these basic topics will allow the reader to understand
most of the materials.
Target Audience
This book is prepared especially for undergraduate or postgraduate
students. It can be utilized as a reference book to teach courses such
as cryptography, network security, and other security-related courses.
It can also help professionals and researchers working in the field of
computers and network security. Moreover, the book includes some
chapters written in tutorial style so that general readers will be able
to easily grasp some of the ideas in relevant areas. Additional material
is available from the CRC Press website:
http://www.crcpress.com/product/isbn/9781482228892.
We hope that this book will be significantly beneficial for the readers.
Any criticism, comments, suggestions, corrections, or updates
about any portion of the book are welcomed.
● Screenshot ●