Current location - Education and Training Encyclopedia - Educational Knowledge - Preface of applied cryptography
Preface of applied cryptography
order

This book 1 version is a national planning textbook for general higher education during the Eleventh Five-Year Plan period. He has been selected into Donghua University, Shanghai Jiaotong University, Sun Yat-sen University, Hunan University, Chengdu Neusoft Institute, Shandong University, Guizhou University, Heilongjiang University, Southwest University of Science and Technology, Guilin University of Electronic Technology, Inner Mongolia University of Science and Technology, Yantai University, PLA Information Engineering University, Naval Academy, Beijing University of Technology, Nanjing University of Technology, Hubei University of Technology, Anhui Normal University, Hangzhou Normal University and Qufu Normal University.

After nearly four years of teaching practice, the textbook has accumulated rich teaching experience; At the same time, China's network communication and information technology applications have developed rapidly, such as the integration of the two industries, the rise of emerging strategic industries such as sensor network, Internet of Things and cloud computing, the smart earth and sensor China, and the third wave of information technology is coming out. Information technology is rapidly changing people's working patterns and living habits, and more and more information security problems follow. Cryptography plays an increasingly important role in information security.

The goal orientation and characteristics of this book

In order to better meet the needs of teaching and better show the core contents and typical applications of cryptography, based on collecting the opinions of students, teachers and other readers, combined with the new teaching objectives and the application requirements of cryptography technology, the contents of the first edition of Applied Cryptography were systematically optimized and comprehensively sorted out, while fully retaining the advanced, typical, easy-to-learn and interesting features of 1 version.

(1) This book focuses on the engineering application of modern cryptography principles and methods. Mainly for engineering students and general engineers and technicians majoring in electrical information; This paper focuses on the basic concepts, basic principles and typical practical technologies of modern cryptography, and does not involve complicated mathematical derivation or proof. It is the basic pursuit of this textbook to facilitate readers to "apply what they have learned" and highlight the cultivation of readers' modern cryptography engineering skills.

(2) The purpose of this book is to construct the content system of the textbook and express the knowledge of cryptography in a way that readers can easily understand and master. Many readers (especially beginners) find it very difficult to learn cryptography. Based on the author's years of teaching experience, this book has a very accurate grasp of the learning needs of readers and the difficulties of this textbook. Therefore, the preparation of this book focuses on facilitating readers to master the basic knowledge of modern cryptography, guiding readers to master the core content of applied cryptography as soon as possible in a small amount of time, and improving learning efficiency. Specially designed in content arrangement and cryptographic algorithm selection, with outstanding content and classic and practical algorithm. At the same time, it is difficult for readers to understand and master the complex mathematical knowledge of cryptography. This book focuses on the core, closely combines the algorithm principle with examples, and the problem-solving process is concrete and clear, and the introduction in simple terms ensures readers to learn easily.

(3) This book tries to make readers have the ability to draw inferences about applied cryptography. Any classroom teaching or teaching materials have certain class hours or space restrictions. On the other hand, many cryptographic algorithms have similar principles. Therefore, this book will not and cannot pursue everything in content. Instead, we will focus on the classic practical cryptographic algorithms with good representation, and strive to clearly and thoroughly explain the basic principles of cryptography from the perspective of engineering application, deeply analyze its application methods in many different typical fields, and promote the "combination of learning and application" and "combination of learning and application". The analysis of typical cryptographic algorithms, basic knowledge of cryptography and their applications is a methodology. On the basis of in-depth understanding and grasping, readers will learn to analyze and solve problems, and have the ability to continue their studies, which is the most important goal that this book hopes to achieve!

The structure of this book

This book begins with the password story, and comprehensively introduces the basic concepts, basic theories and typical practical technologies of applied cryptography. Structurally, it is divided into two parts: cryptography principle, cryptography application and practice; The book consists of 65,438+07 chapters, covering cryptography foundation, classical cryptography, introduction to cryptography mathematics, symmetric cryptography, asymmetric cryptography, hash function and message authentication, digital signature, key management, stream cryptography and new progress in cryptography. The book also introduces the application methods and technologies of cryptography in digital communication security, industrial network control security, wireless sensor network sensing security, radio frequency identification security, e-commerce payment security and other typical fields. At the end of each chapter, appropriate thinking questions and exercises are given to consolidate knowledge and have reference answers. For the convenience of use, the parts with higher requirements are marked with "*".

Teachers can explain all or part of the contents within 48 ~ 64 hours, or practice with appropriate computer operation, so as to quickly grasp the core contents of applied cryptography in a limited time and improve learning efficiency.

Revision of the second edition

(1) Delete. This book has deleted some contents in 1 that are difficult to understand and do not affect the introduction of basic knowledge of cryptography, including the field represented by optimized normal basis, the square structure of AES, some examples related to optimized normal basis in elliptic curve cryptosystem, and the mathematical description of quantum uncertainty principle.

(2) increase. In order to make the book's content system more perfect, password stories, cryptography and RFID security, the relationship between security mechanisms and security services, the classification of P-boxes, SMS4 algorithm A5/ 1 algorithm, Kerberos and so on are added.

(3) change. In order to make the content of the book more optimized and the expression more easy to understand, there are many changes involved in this aspect. It mainly includes the development history of cryptography, main forms of security attacks, classification of cryptanalysis, network communication security model, asymmetric cryptographic model, substitution and transposition cryptography, Euclid algorithm, concept of group, operation mode of block cipher, examples of des and AES, effective implementation of RSA algorithm, digital signature application of RSA, examples of ECC, register value change process of examples in SHA-5 12, and digital signature.

The target of this book.

This book can be used as a textbook for senior undergraduates and postgraduates majoring in cryptography, applied mathematics, information security, communication engineering, computer, information management, e-commerce, Internet of Things, networked measurement and control, etc. It can also be used as a reference for researchers and engineers engaged in the management, application, design and development of network and communication information security related fields. Especially suitable for beginners who find it difficult to learn cryptography.

Express gratitude/gratitude

This book is edited by a professor from Chongqing University of Posts and Telecommunications, with chapters 3, 4, 10 and 12 edited by Wei and chapter 15 edited by Wei. The rest of the chapters, CAI courseware and problem solving are written by,, Tang Qiwei, Bai Runzi, Feng Rui, Yu and Wan Tianxiang. In particular, the author would like to thank all the authors listed in the references, including many who failed to list all the information in the references. It is precisely because of their unique insights and special contributions in their respective fields that they provide valuable materials and rich sources of writing for the author, so that the author can learn from others on the basis of summarizing the achievements of teaching and scientific research, and form a textbook of applied cryptography with clear positioning, adaptability, self-value, uniqueness and universality. Kang Xia, editor of Electronic Industry Press, has devoted a lot of efforts to the high-quality publication of this book, and I would like to express my heartfelt thanks to them for their hard work. The compilation and publication of this book is supported by the Natural Science Foundation of Chongqing Science and Technology Commission (CQ CSTC 2009BB2278) and the National Natural Science Foundation.

Applied cryptography has a special position, looming, rich connotation, wide application and rapid development. The revised edition of this book is another attempt by the author in this field. Due to the author's level and knowledge, there are inevitably omissions and mistakes in the book. I sincerely hope that readers will give me their opinions, which will facilitate revision and benefit more readers.

compilers

20 1 1 March

order

With the development of information in the world, Internet, telecommunication network, radio and television network are moving towards triple play, and computer, communication and digital electronic products are also moving towards 3C. People's social life depends more and more on the network, and the security of information and information systems is more and more closely related to public interests. When human beings face the outside world in the wild, personal safety is the first demand, and people need to teach each other the experience and skills of safety prevention. When human beings step into the information society, we can easily find that information security is still our first demand, and now it is more necessary than ever to popularize the awareness and knowledge of information security. Only when this awareness and knowledge are truly mastered by engineers and technicians and accepted by the public can the information security of the whole society be reliably guaranteed.

Since Xiang Long's article "Information Theory of Secure Communication" was published more than 50 years ago, cryptography has gradually embarked on a rigorous and scientific road from empirical art and has become a solid cornerstone of information security technology in today's society. If you don't understand cryptography, it is difficult to really control information security. On the other hand, a series of new information security topics (many of which are interesting scientific problems and serious social problems) put forward by the Internet and other contemporary information technology fields have in turn promoted the continuous in-depth development and wide application of cryptography, making cryptography full of vitality and charm.

Cryptography and its application are interdisciplinary research fields, and the significance of its achievements and thinking methods is not limited to mathematics, or even information security. Since 1970s, abroad, cryptography and coding theory and technology have gradually become the basic courses of many engineering disciplines. In fact, they are not only beneficial to the cultivation of science and engineering students, but also to the cultivation of liberal arts students such as law and management.

Modern cryptography is indeed based on mathematical theory, but people who use it are by no means limited to mathematicians. Contemporary engineers and technicians may need it more urgently, and its application and development need to be popularized and deepened to more and more cross-fields. In order to achieve the goal of accuracy, conciseness and beauty, cryptography often needs to be described from a formal mathematical level; At the same time, cryptography also needs people to understand from the perspective of engineering application, and even introduce and think from the perspective of logical common sense and extensive knowledge background, so as to understand its essence, enrich its connotation and use it flexibly.

However, due to historical reasons, there are relatively few Chinese cryptology courses suitable for engineers and technicians. The abstract form of modern cryptography makes many people with other professional backgrounds afraid of it, which hinders the popularization of its exquisite ideas and methods. Nowadays, more and more cryptography application problems have been raised in the field of network security, and the demand for applied cryptography monographs has become more and more extensive and urgent objectively.

Applied cryptography gives readers with engineering background one more choice, which makes up for the above regret to some extent. Most of the contents of this book come from the author's teaching practice of cryptography in engineering disciplines, focusing on introducing the essence of cryptography in a way that engineers and students can easily accept, rather than sticking to exquisite theoretical proof and formal rigor. Some key chapters in the book also set up many valuable concrete examples, and the book is equipped with computer CAI teaching courseware, which is beneficial to readers. In view of the current hot issues of network security, the author also introduces some new typical applications in the book at the right time, which makes the content of this book more colorful.

This book seems to be pursuing a belief: more people's practice and thinking will help promote the development of cryptography, and applied cryptography knowledge in various styles and application fields can contribute to the construction of cryptography. After reading it, it feels like a preface.

Researcher and doctoral supervisor of Chengdu Institute of Computer Application, China Academy of Sciences.