Making, Breaking Codes: An Introduction to Cryptology
published by Prentice-Hall, ISBN 0-13-030369-0.
Now in a second corrected printing
- Simple Ciphers
- The Shift Cipher
- Reduction/Division Algorithm
- The One-Time Pad
- The Affine Cipher
- Probability
- Counting
- Basic Ideas
- Statistics of English
- Attack on the Affine Cipher
- Permutations
- Substitutions
- Transpositions
- Permutations [...through here by Sept 30]
- Shuffles ...Optional
- Block Interleavers ...Optional
- A Serious Cipher
- The Vigenere Cipher ...Optional (but important!)
- LCMs and GCDs
- Kasiski Attack ... Optional
- Expected Values
- Friedman Attack ...Optional (but important!)
- More Probability
- Generating Functions [...through here by Oct 16]
- Variance, Standard Deviation ... Optional
- Chebycheff's Inequality ... Optional
- Law of Large Numbers ... Optional
- Modern Symmetric Ciphers ... Optional
- Design Goals
- Data Encryption Standard
- Advanced Encryption Standard
- The Integers
- Divisibility
- Unique Factorization
- Euclidean Algorithm
- Multiplicative Inverses
- Computing Inverses [...through here by Oct 21]
- Equivalence Relations
- The Integers mod m
- Primitive Roots, Discrete Logs
- The Hill Cipher ... Optional
- Hill Cipher Operation
- Hill Cipher Attacks
- Complexity ... Optional
- Big-Oh/Little-Oh Notation
- Bit-Operations
- Probabilistic Algorithms
- Complexity
- Subexponential Algorithms
- Kolmogorov Complexity
- Linear Complexity
- Worst-Case versus Expected
- Public-Key Ciphers
- A Little History
- Trapdoors
- The RSA Cipher
- Diffie-Hellman Key Exchange
- ElGamal Cipher [...through here by Oct 28]
- Knapsack Ciphers ... Optional
- NTRU Cipher ... Optional
- Arithmetica Key Exchange ... Optional
- Quantum Cryptography ... Optional
- U.S. Export Regulations ... Optional
- Prime Numbers ... Optional
- Euclid's Theorem
- Prime Number Theorem
- Primes in Sequences
- Chebycheff's Theorem
- Sharpest Asymptotics
- Riemann Hypothesis
- Roots mod p
- Fermat's Little Theorem
- Factoring Special Expressions
- Mersenne Numbers
- More Examples
- Exponentiation Algorithm
- Square Roots mod p
- Higher Roots mod p [...through here by Nov 6]
- Roots Mod Composites delayed: after Pseudoprimes...
- Sun Ze's Theorem
- Special Systems
- Composite Moduli
- Hensel's Lemma
- Square-Root Oracles
- Euler's Theorem
- Facts about Primitive Roots
- Euler's Criterion
- Weak Multiplicativity ... Optional
- Weak Multiplicativity
- Arithmetic Convolutions
- Mobius Inversion
- Quadratic Reciprocity ... Optional
- Square Roots
- Quadratic Symbols
- Multiplicative Property
- Quadratic Reciprocity
- Fast Computation
- Pseudoprimes
- Fermat Pseudoprimes
- Non-Prime Pseudoprimes
- Euler Pseudoprimes ... Optional
- Solovay-Strassen Test ... Optional
- Strong Pseudoprimes
- Miller-Rabin Test [...through here by Nov 13]
- Groups
- Groups
- Subgroups
- Lagrange's Theorem
- Index of a Subgroup
- Laws of Exponents
- Cyclic Subgroups
- Euler's Theorem
- Exponents of Groups
- Sketches of Protocols
- Basic Public-Key Protocol
- Diffie-Hellman Key Exchange
- Secret Sharing
- Partial disclosure of secrets
- Oblivious Transfer
- Zero-Knowledge Proofs
- Authentication
- e-Money, e-Commerce
- Rings, Fields, Polynomials
- Rings, Fields
- Divisibility
- Polynomial Rings
- Euclidean Algorithm
- Euclidean Rings
- Cyclotomic Polynomials
- Characteristics
- Multiple Factors
- Cyclotomic Polynomials
- Primitive Roots
- Primitive Roots mod p
- Prime Powers
- Counting Primitive Roots
- Non-Existence
- Search Algorithm
- Random Number Generators
- Fake One-Time Pads
- Period of a pRNG
- Congruential Generators
- Feedback Shift Generators
- Blum-Blum-Shub Generator
- Naor-Reingold Generator
- Periods of LCGs
- Primitive Polynomials
- Periods of LFSRs
- Examples of Primitives
- Testing for Primitivity
- Counting Primitives
- More on Groups ... Optional
- Group Homomorphisms
- Finite Cyclic Groups
- Infinite Cyclic Groups
- Roots and Powers in Groups
- Square Root Algorithm
- Pseudoprimality Proofs ... Optional
- Lambda Function
- Carmichael Numbers
- Euler Witnesses
- Strong Witnesses
- Factorization Attacks
- Pollard's Rho Method [this section by Nov 13]
- Pollard's p-1 method
- Pocklington-Lehmer Criterion
- Strong Primes
- Primality Certificates
- Modern Factorization Attacks
- Gaussian Elimination
- Random Squares Factoring
- Dixon's Algorithm
- Non-Sieving Quadratic Sieve
- The Quadratic Sieve
- Other Improvements
- Finite Fields
- Making Finite Fields
- Examples of Field Extensions
- Addition mod P
- Multiplication mod P
- Multiplicative Inverses mod P
- Discrete Logs
- Baby-step Giant-step
- Pollard's Rho Method
- Logs in GF(32)
- Pohlig-Hellman Algorithm
- The Index Calculus
- Elliptic Curves
- Abstract Discrete Logarithms
- Discrete Log Ciphers
- Elliptic Curves
- Points at Infinity
- Projective Elliptic Curves
- More on Rings and Fields
- Ideals in Commutative Rings
- Ring Homomorphisms
- Quotient Rings
- Maximal Ideals and Fields
- Prime Ideals and Integral Domains
- More on Field Extensions
- Frobenius Automorphism
- Counting Irreducibles
- Counting Primitives
- Appendices
- Sets and Functions
- Searching, Sorting
- Vectors
- Matrices
- Stirling's Formula
- Tables
- Factorizations under 600
- Primes Below 10,000
- Primitive Roots under 100
© July 2000,
Paul Garrett ...
[ home ]
... [ garrett@math.umn.edu
]
The University of Minnesota explicitly requires that I
state that "The views and opinions expressed in this page are
strictly those of the page author. The contents of this page have not
been reviewed or approved by the University of Minnesota."