Cryptography Algorithms, A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption 1st Edition Massimo Bertaccini All Chapters Instant Download
Cryptography Algorithms, A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption 1st Edition Massimo Bertaccini All Chapters Instant Download
com
OR CLICK HERE
DOWLOAD NOW
https://ebookmeta.com/product/cryptography-algorithms-2nd-edition-
early-release-massimo-bertaccini/
ebookmeta.com
https://ebookmeta.com/product/applied-cryptography-protocols-
algorithms-and-source-code-in-c-2nd-edition-bruce-schneier/
ebookmeta.com
https://ebookmeta.com/product/getting-started-with-angular-create-and-
deploy-angular-applications-1st-edition-victor-hugo-garcia/
ebookmeta.com
Raptors in Captivity guidelines for care management Arent
https://ebookmeta.com/product/raptors-in-captivity-guidelines-for-
care-management-arent/
ebookmeta.com
https://ebookmeta.com/product/the-poco-field-an-american-story-of-
place-1st-edition-talmage-a-stanley/
ebookmeta.com
https://ebookmeta.com/product/objects-of-desire-1st-edition-c-j-
emerson/
ebookmeta.com
https://ebookmeta.com/product/game-changer-seattle-steelheads-
football-game-on-in-seattle-7-1st-edition-jami-davenport/
ebookmeta.com
Theatre Fiction in Britain from Henry James to Doris
Lessing Writing in the Wings 1st Edition Graham Wolfe
https://ebookmeta.com/product/theatre-fiction-in-britain-from-henry-
james-to-doris-lessing-writing-in-the-wings-1st-edition-graham-wolfe/
ebookmeta.com
Cryptography
Algorithms
Massimo Bertaccini
BIRMINGHAM—MUMBAI
Cryptography Algorithms
Copyright © 2022 Packt Publishing
All rights reserved. No part of this book may be reproduced, stored in a retrieval system,
or transmitted in any form or by any means, without the prior written permission of the publisher,
except in the case of brief quotations embedded in critical articles or reviews.
Every effort has been made in the preparation of this book to ensure the accuracy of the
information presented. However, the information contained in this book is sold without warranty,
either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors,
will be held liable for any damages caused or alleged to have been caused directly or indirectly
by this book.
Packt Publishing has endeavored to provide trademark information about all of the companies
and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing
cannot guarantee the accuracy of this information.
978-1-78961-713-9
www.packt.com
To my mom, Nadia, and my dad, Domenico, for their sacrifices
and giving me the opportunity to learn and grow.
To my "soulmate" Elaine for her support.
– Massimo Bertaccini
Contributors
About the author
Massimo Bertaccini is a researcher and principal scientist, CEO, and co-founder
of Cryptolab Inc.
His career started as a professor of mathematics and statistics. Then, he founded
Cryptolab, a start-up in the field of cryptography solutions for cybersecurity. With his
team of engineers, he projected and implemented the first search engine in the world that
is able to work with encrypted data.
He has obtained several international prizes and awards, including the Silicon Valley
inventors award and the Seal of Excellence from the EU.
Currently, he teaches mathematical models at EMUNI University as a contract
professor and has published many articles in the field of cryptography, cybersecurity,
and blockchain.
Preface
3
Asymmetric Encryption
Introduction to asymmetric RSA 86
encryption76 Explaining RSA 88
The pioneers 77 Analyzing RSA 89
Conventional attacks on the algorithm 90
The Diffie-Hellman algorithm 78
The application of RSA to verify
The discrete logarithm 80 international treaties 92
Explaining the D-H algorithm 82 Unconventional attacks 94
Analyzing the algorithm 83
Possible attacks and cryptanalysis on PGP97
the D-H algorithm 84 The ElGamal algorithm 98
Summary101
4
Introducing Hash Functions and Digital Signatures
A basic explanation of hash Authentication and digital
functions104 signatures 120
Overview of the main hash RSA digital signatures 122
algorithms107 Digital signatures with the
Logic and notations to implement ElGamal algorithm 127
hash functions 109 Blind signatures 130
Explanation of the SHA-1 algorithm 113
Summary134
Notes and example on SHA-1 117
Table of Contents ix
6
New Algorithms in Public/Private Key Cryptography
The genesis of the MB09 A direct signature method in MBXI 207
algorithm 177 The appendix signature method
Introducing the MB09 with MBXI 209
algorithm181 A mathematical demonstration of the
MBXI digital signature algorithm 210
An explanation of MB09 184
The evolution of MB09
Introducing the MBXI algorithm191
and MBXI – an introduction
A numerical example of MBXI 194 to MBXX 213
Unconventional attacks on RSA 197 An explanation of the MBXX protocol 217
7
Elliptic Curves
An overview of elliptic curves 226 Implementing the D-H
Operations on elliptic curves 226 algorithm on elliptic curves 235
Scalar multiplication 232
x Table of Contents
8
Quantum Cryptography
Introduction to Q-Mechanics Analysis attack and technical
and Q-Cryptography 256 issues 273
An imaginary experiment to Quantum computing 277
understand the elements of Shor's algorithm 280
Q-Mechanics 258 Step 1 – Initializing the qubits 281
Step 1 – Superposition 258 Step 2 – Choosing the random
Step 2 – The indetermination process 261 number, a 282
Step 3 – Spin and entanglement 262 Step 3 – Quantum measurement 284
Step 4 – Finding the right candidate, (r) 285
Q-Cryptography 265
Quantum key distribution – Quantum Fourier Transform 286
BB84268 Step 5 – Factorizing (n) 290
Step 1 – Initializing the quantum Notes on Shor's algorithm 290
channel270
Step 2 – Transmitting the photons 270 Post-Q-Cryptography 291
Step 3 – Determining the shared key 271 Summary292
Table of Contents xi
B ELOW The Journal office the lake was engaged on its evening’s
business. Great freighters, with lighted ends throwing their vast lengths
into black relief, moved in dignity across the harbor, past the red,
revolving lights into the lake. Excursion steamers, brightly lit from top to
bottom, looking like moving palaces in the distance, sailed out with their
load of pleasure seekers, and little tugs steamed out cheerily to welcome the
great boats which would return to harbor that night. Jim watched it as he
had watched it so many nights when he was alone. He would rather be here
where there was a sense of Horatia’s presence than go home to the lonely
rooms which held the things which he had hoped to share with her. He
stood quietly before the window, his face saddened as it had looked since
the day he read Jack Hubbell’s letter and his eyes were fixed on the moving
lake before him as if he drew from it some comfort or strength. He did not
hear the steps on the stairs, but another listener would have noticed how
eager they were and wondered at the pause before the door. It opened
quietly but Jim did not turn. Then he became conscious that someone was
looking at him from the door of his room. He turned and saw Horatia. She
stood with her eyes upon him as if she were asking something. And for a
moment each was stilled by the rush of emotions that the other roused.
Then Jim knew what her question was and with his answer came into his
own at last. No longer hesitant, no longer fearful, he seemed to know that
she had come back to him, needing him as he needed her, seeking his
embrace. He held her close, strong and jealous, and she was content. The
resignation in his face had turned to a burning hunger.
“You came back to me!”
“I came back to see if you’d have me.”
But he would have no such humility. He did not want humility.
“I’ll never let you go again. You’ve had your chance. It’s been hell,
Horatia. I’ll never let you go.”
She settled into his arms, gently, happily.
“And I was all wrong,” he went on; “I treated you badly. Rose Hubbell is
a criminal—she’s bad. When I found out I wanted to come to tell you but I
wasn’t sure you’d want me. I’ll never see her again of course.”
“Hush—no promises. I know better than that now. We don’t need to hold
each other by promises. We have love. It holds us.”
“We have love.”
He was strong, sure as she had never seen him in his love-making.
“We’ll be married tomorrow—tomorrow. I can’t wait any longer,
darling,” he whispered and bent to kiss her.
“Tomorrow,” she breathed exultantly, with a welcome of tomorrow
alight in her eyes.
Updated editions will replace the previous one—the old editions will
be renamed.
1.D. The copyright laws of the place where you are located also
govern what you can do with this work. Copyright laws in most
countries are in a constant state of change. If you are outside the
United States, check the laws of your country in addition to the terms
of this agreement before downloading, copying, displaying,
performing, distributing or creating derivative works based on this
work or any other Project Gutenberg™ work. The Foundation makes
no representations concerning the copyright status of any work in
any country other than the United States.
• You pay a royalty fee of 20% of the gross profits you derive from
the use of Project Gutenberg™ works calculated using the
method you already use to calculate your applicable taxes. The
fee is owed to the owner of the Project Gutenberg™ trademark,
but he has agreed to donate royalties under this paragraph to
the Project Gutenberg Literary Archive Foundation. Royalty
payments must be paid within 60 days following each date on
which you prepare (or are legally required to prepare) your
periodic tax returns. Royalty payments should be clearly marked
as such and sent to the Project Gutenberg Literary Archive
Foundation at the address specified in Section 4, “Information
about donations to the Project Gutenberg Literary Archive
Foundation.”
• You comply with all other terms of this agreement for free
distribution of Project Gutenberg™ works.
1.F.
1.F.4. Except for the limited right of replacement or refund set forth in
paragraph 1.F.3, this work is provided to you ‘AS-IS’, WITH NO
OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
Please check the Project Gutenberg web pages for current donation
methods and addresses. Donations are accepted in a number of
other ways including checks, online payments and credit card
donations. To donate, please visit: www.gutenberg.org/donate.
Most people start at our website which has the main PG search
facility: www.gutenberg.org.