Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Other

Fundamentals of Cryptology: Master Essential Techniques

Rating
-
Sold
-
Pages
503
Uploaded on
20-02-2026
Written in
2024/2025

Fundamentals of Cryptology presents a practical, classroom-to-lab introduction to modern cryptographic thinking and techniques. Authored by Henk C.A. Tilborg, the tutorial focuses on the core security goals—confidentiality, integrity, and authenticity—and shows how those goals map to building blocks like symmetric and public-key encryption, hash functions, digital signatures, and authenticated encryption. The text balances mathematical intuition with real-world examples, annotated code snippets, and lab-style exercises so you can both understand why algorithms work and apply them safely in production contexts. What You Will Learn Foundational principles: Precise definitions of confidentiality, integrity, authentication, and non-repudiation and how to achieve them with cryptographic primitives. Practical primitives: When to use symmetric ciphers versus public-key systems, correct use of block and stream ciphers, and how modes of operation affect security. Hashing & signatures: Role of hash functions in integrity and how digital signatures and certificates establish trust and authenticity. Protocol design: Constructing secure channels, common pitfalls in TLS-style protocols, and composing primitives safely (AEAD, key derivation, nonce handling). Key lifecycle: Best practices for key generation, secure storage, rotation, and distribution—practical guidance for reducing real-world risk. Advanced topics: Introductory material on elliptic-curve techniques, stream ciphers, and emerging challenges such as quantum-resistant approaches.

Show more Read less
Institution
Course

Content preview

FUNDAMENTALS OF
CRYPTOLOGY
A Professional Reference
and Interactive Tutorial




by




Henk C.A. van Tilborg
Eindhoven University of Technology
The Netherlands




KLUWER ACADEMIC PUBLISHERS
Boston/Dordrecht/London

,
,Contents
Preface xiii
1 Introduction 1
1.1 Introduction and Terminology 1
1.2 Shannon's Description of a Conventional Cryptosystem 2
1.3 Statistical Description of a Plaintext Source 4
1.4 Problems 7

2 Classical Cryptosystems 9
2.1 Caesar, Simple Substitution, Vigenère 9
2.1.1 Caesar Cipher 9
2.1.2 Simple Substitution 10
The System and its Main Weakness 10
Cryptanalysis by The Method of a Probable Word 11
2.1.3 Vigenère Cryptosystem 13
2.2 The Incidence of Coincidences, Kasiski's Method 16
2.2.1 The Incidence of Coincidences 16
2.2.2 Kasiski's Method 19
2.3 Vernam, Playfair, Transpositions, Hagelin, Enigma 20
2.3.1 The One-Time Pad 20
2.3.2 The Playfair Cipher 20
2.3.3 Transposition Ciphers 21
2.3.4 Hagelin 22
2.3.5 Enigma 24
2.4 Problems 25

3 Shift Register Sequences 27
3.1 Pseudo-Random Sequences 27
3.2 Linear Feedback Shift Registers 31
3.2.1 (Linear) Feedback Shift Registers 31
3.2.2 PN-Sequences 35
3.2.3 Which Characteristic Polynomials give PN-Sequences? 38
3.2.4 An Alternative Description of :+ f / for Irreducible f 44
3.2.5 Cryptographic Properties of PN Sequences 46
3.3 Non-Linear Algorithms 49
3.3.1 Minimal Characteristic Polynomial 49
3.3.2 The Berlekamp-Massey Algorithm 52
3.3.3 A Few Observations about Non-Linear Algorithms 58

, vi




3.4 Problems 60

4 Block Ciphers 63
4.1 Some General Principles 63
4.1.1 Some Block Cipher Modes 63
Codebook Mode 63
Cipher Block Chaining 64
Cipher Feedback Mode 65
4.1.2 An Identity Verification Protocol 66
4.2 DES 67
DES 67
Triple DES 69
4.3 IDEA 70
4.4 Further Remarks 72
4.5 Problems 73

5 Shannon Theory 75
5.1 Entropy, Redundancy, and Unicity Distance 75
5.2 Mutual Information and Unconditionally Secure Systems 80
5.3 Problems 85

6 Data Compression Techniques 87
6.1 Basic Concepts of Source Coding for Stationary Sources 87
6.2 Huffman Codes 92
6.3 Universal Data Compression - The Lempel-Ziv Algorithms 97
Initialization 98
Encoding 99
Decoding 101
6.4 Problems 103

7 Public-Key Cryptography 105
7.1 The Theoretical Model 105
7.1.1 Motivation and Set-up 105
7.1.2 Confidentiality 106
7.1.3 Digital Signature 107
7.1.4 Confidentiality and Digital Signature 108
7.2 Problems 109

8 Discrete Logarithm Based Systems 111
8.1 The Discrete Logarithm System 111
8.1.1 The Discrete Logarithm Problem 111
8.1.2 The Diffie-Hellman Key Exchange System 114
8.2 Other Discrete Logarithm Based Systems 116
8.2.1 ElGamal's Public-Key Cryptosystems 116

Written for

Institution
Course

Document information

Uploaded on
February 20, 2026
Number of pages
503
Written in
2024/2025
Type
OTHER
Person
Unknown

Subjects

$3.89
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
kakom

Get to know the seller

Seller avatar
kakom Self
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
2 months
Number of followers
0
Documents
33
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions