2010 SP Buchmann Introduction To Cryptography
2010 SP Buchmann Introduction To Cryptography
by
Mohamed Saied Emam Mohamed
Technical University of Darmstadt (TUD), Germany
1
In the next part of this text, cryptographic hash functions and digital signatures are
discussed. Chapter 11 explains the structure of hash functions and their application in
cryptography. It gives SHA-1 as an example. The idea of digital signature and its security
are found in chapter 12. The author uses RSA, ElGamal, and DSA as examples to digital
signature schemes. Simply he describes the key generation, the signature generation, and
the verification of each example. He studies the efficiency and some attack scenarios for
each one of them. Also he presents an example of a special purpose digital signature, so-
called blind signatures. Two different protocols are given (Chaum and Okamoto-Schnorr).
In the last part of this book, the author briefly introduces some other topics. In less than
three pages he defines the elliptic curves. Identification, secret charing, and public key
infrastructure are just explained in a very brief way.
2 Summary
I like the structure of this book. It gives a general mathematical background in the
beginning and particular mathematical preliminaries just at the time you need them to
understand some specific cryptographic method. It provides a clearly detailed presen-
tation of some selected methods in cryptography. The focus of this book is on number
theoretic algorithms that are used in cryptography like primality testing, factorization
and discrete logarithms. It also provides a detailed description of block ciphers as an
example of symmetric cryptography. Explanations of some basic particular cryptography
such as digital signatures, hash functions, secret sharing, and certificate authentications
are provided. The brief description of some important methods in cryptography repre-
sents one of the drawbacks of this book, for example the part that is dealing with elliptic
curve. Also the definitions of O-notation and Ω-notation are not clear.
3 Recommendation
As the author mentioned this book is based on courses in cryptography that have been
taught by the author himself at the Technical University of Darmstadt. So I would rec-
ommend this text for undergraduate students or readers who want to get an overview
of some modern cryptographic methods and their mathematical preliminaries, like for
example RSA and DES. The text is just 324 pages, so it is focusing on some crypto-
graphic methods like number theoretical cryptographic techniques and just touches some
other methods like elliptic curves. For readers that need texts with more wide details in
cryptography, I recommend these books: