![The Joy of Cryptography cover image Read more about The Joy of Cryptography](https://open.umn.edu/rails/active_storage/representations/redirect/eyJfcmFpbHMiOnsiZGF0YSI6MTMwMiwicHVyIjoiYmxvYl9pZCJ9fQ==--511dc08d58210065e7ce9ad88caa030a53ae9e24/eyJfcmFpbHMiOnsiZGF0YSI6eyJmb3JtYXQiOiJwbmciLCJyZXNpemUiOiI0OTB4MTAwMCJ9LCJwdXIiOiJ2YXJpYXRpb24ifX0=--1d221d0e87311391d13a7728d03226e2fff3667a/joycrypto.png)
The Joy of Cryptography
No ratings
Mike Rosulek, Oregon State University
Copyright Year:
Last Update: 2021
Publisher: Oregon State University
Language: English
Formats Available
Conditions of Use
Attribution-NonCommercial-ShareAlike
CC BY-NC-SA
Table of Contents
- 0 Review of Concepts & Notation
- 1 One-Time Pad & Kerckhoffs' Principle
- 2 The Basics of Provable Security
- 3 Secret Sharing
- 4 Basing Cryptography on Intractable Computations
- 5 Pseudorandom Generators
- 6 Pseudorandom Functions & Block Ciphers
- 7 Security Against Chosen Plaintext Attacks
- 8 Block Cipher Modes of Operation
- 9 Chosen Ciphertext Attacks
- 10 Message Authentication Codes
- 11 Hash Functions
- 12 Authenticated Encryption & AEAD
- 13 RSA & Digital Signatures
- 14 Diffie-Hellman Key Agreement
- 15 Public-Key Encryption
Ancillary Material
About the Book
The pedagogical approach is anchored in formal definitions/proof of security, but in a way that I believe is more accessible than what is "traditional" in crypto. All security definitions are written in a unified and simplified "game-based" style. For an example of what security definitions look like in this style, see the index of security definitions (which will make more sense after reading chapters 2 & 4).
About the Contributors
Author
Mike Rosulek, Oregon State University