|
Recommended supplementary reading (not required)
Cryptography and Security
-
Christof Paar and Jan Pelzl,
Understanding Cryptography, Springer, 2010,
ISBN-13: 978--3--642--04100--6, ISBN-10:
364204100.
This is our primary textbook, at least for the first
part of the course. It is available for free through
the Yale library.
-
Wade Trappe and Lawrence C. Washington,
Introduction to Cryptography with Coding Theory,
Second Edition, Pearson, 2006, ISBN-10:
0131862391, ISBN-13: 9780131862395. Suggested retail
price: $141.33.
Google product search lists a variety of sellers
of new and used copies at varying prices.
-
Bruce Schneier,
Applied Cryptography, Second Edition, John
Wiley & Sons, Inc., 1996, ISBN 0-471-11709-9
(paperback).
Contains a wealth of timely information and gives
broad coverage of the field. Often glosses over
details in favor of readability, and sometimes gets
the details wrong. There are also many errors,
particularly before the 5th printing. An errata
sheet is available at http://www.counterpane.com/ac2errv30.html.
-
Charlie Kaufman, Radia Perlman, and Mike Speciner,
Network Security: Private Communication in a
Public World, Prentice-Hall PTR, 2002, ISBN
0-13-046019-2.
Gives a nice account of practical security issues and
motivates much of the material that we will be
studying.
-
Douglas R. Stinson,
Cryptography: Theory and Practice, Third
Edition, Chapman & Hall/CRC, 2005,
ISBN-10: 1-58488-508-4; ISBN-13: 978-58488-508-5.
Gives a nice treatment of some of the more
mathematical and lower-level aspects of cryptography.
The opening chapters give a particularly nice account
of classical cryptography and cryptanalysis.
-
Alfred J. Menezes, Paul C. van Oorschot, and Scott
A. Vanstone,
Handbook of Applied Cryptography, CRC
Press, 1997, pp. 816, ISBN 0849385237.
This tome has similar coverage to Schneier but is
much more rigorous (at the cost of readability). It
is an invaluable reference book if you want to
actually implement any of these methods.
-
Wenbo Mao,
Modern Cryptography: Theory &
Practice}, Prentice-Hall, 2004, ISBN
0--13--066943--1.
This book is a must for anyone wanting to implement
cryptographic algorithms for use in the real world.
As well as presenting the principles of cryptography,
it also points out many of the subtle real-world
issues that can lead to problems with implementations
of otherwise-sound algorithms.
-
Shafi Goldwasser and Mihir Bellare, Lecture
Notes on Cryptography, 2008. This book from
two top cryptographers gives a rigorous mathematical
treatment of many of the topics that we will be
presenting.
-
Nigel P. Smart, Cryptography,
An Introduction: Third Addition.
- Jonathan Katz and
Yehuda Lindell,
Introduction to
Modern Cryptography: Second Edition, Chapman
& Hall/CRC, 2014, ISBN 978-1-46657-026-9.
This book presents cryptography according to the
principles of modern cryptography: formal definitions,
precise assumptions, and proofs of security. It is
mathematically more difficult than the most of the
books mentioned above but rewarding to those who can
handle the required level of formalism and rigor.
-
Kościelny, Czesław, Kurkowski, Mirosław, Srebrny,
Marian,
Modern Cryptography Primer, Springer,
2013, ISBN 978--3--642--41386--5.
This book closely tracks the first part of the course
but from a more theoretical point of view.
-
Privacy and Social IssuesWhile this is not a
social sciences course, the subject matter of this
course has major policy implications, particularly
with respect to privacy on the internet. The books
listed below give some background and insight into
social issues that are currently the subject of wide
debate.
-
Fred H. Cate,
Privacy in the Information Age,
Brookings Institute, 1997, pp. 200, ISBN
0-8157-1315-0.
-
Whitfield Diffie and Susan Landau,
Privacy on the Line: The Politics of
Wiretapping and Encryption, the MIT
Press, Cambridge, Massachusetts, 1999,
pp. 360, ISBN 0-262-54100-9.
-
Lawrence Lessig,
Code and Other Laws of Cyberspace,
Basic Books, Perseus Books Groups, New York,
2000, ISBN 0-465-03913-8.
-
Reg Whitaker,
The End of Privacy: How Total Surveillance Is
Becoming a Reality, New Press, 1999,
pp. 208, ISBN 1-56584-569-4.
The GNU Multiprecision Arithmetic Library
(GMP)
This package contains efficient routines for
performing arbitrary-precision arithmetic. The
functions most relevant for this course are the
mpz functions, which operate on large signed
integers. GMP is installed on the Zoo. Type
info gmp for documentation. More
information is available at gmplib.org
Other Resources on the Web
Ron Rivest
(the "R" of RSA) maintains an
index of links to a wealth of information on
cryptography and security.
The USACM Encryption
Policy Library contains pointers to policy
debates, position papers, and pending legislation
concerning encryption and computer security.
Bruce Schneier
publishes a monthly cryptograpy newsletter, Crypto-gram.
This is a good source of news on the current state of
computer security and cryptography policy.
The
DES Standard (withdrawn) at the NIST web
site.
The AES
Standard at the NIST web site.
|