Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Cryptography Algorithms

You're reading from   Cryptography Algorithms A guide to algorithms in blockchain, quantum cryptography, zero-knowledge protocols, and homomorphic encryption

Arrow left icon
Product type Paperback
Published in Mar 2022
Publisher Packt
ISBN-13 9781789617139
Length 358 pages
Edition 1st Edition
Languages
Concepts
Arrow right icon
Author (1):
Arrow left icon
Massimo Bertaccini Massimo Bertaccini
Author Profile Icon Massimo Bertaccini
Massimo Bertaccini
Arrow right icon
View More author details
Toc

Table of Contents (15) Chapters Close

Preface 1. Section 1: A Brief History and Outline of Cryptography
2. Chapter 1: Deep Diving into Cryptography FREE CHAPTER 3. Section 2: Classical Cryptography (Symmetric and Asymmetric Encryption)
4. Chapter 2: Introduction to Symmetric Encryption 5. Chapter 3: Asymmetric Encryption 6. Chapter 4: Introducing Hash Functions and Digital Signatures 7. Section 3: New Cryptography Algorithms and Protocols
8. Chapter 5: Introduction to Zero-Knowledge Protocols 9. Chapter 6: New Algorithms in Public/Private Key Cryptography 10. Chapter 7: Elliptic Curves 11. Chapter 8: Quantum Cryptography 12. Section 4: Homomorphic Encryption and the Crypto Search Engine
13. Chapter 9: Crypto Search Engine 14. Other Books You May Enjoy

What this book covers

Chapter 1, Deep Diving into Cryptography Landscape, gives an introduction to cryptography, what it is needed for, and why it is so important in IT. This chapter also provides a panoramic view of the principal algorithms in the history of cryptography.

Chapter 2, Introduction to Symmetric Encryption, analyzes symmetric encryption. We will focus on algorithms such as DES, AES and Boolean Logic, which are widely used to implement cybersystems. Finally, we will showcase attacks to these algorithms.

Chapter 3, Asymmetric Encryption, analyzes the classical asymmetric encryption algorithms, such as RSA and Diffie–Hellman, and the main algorithms in private/public key encryption.

Chapter 4, Introducing Hash Functions and Digital Signatures, focuses on hash functions such as SHA-1 and looks at digital signatures, which are one of the pillars of modern cryptography. We will look at the most important and famous signatures and blind signatures (a particular case of anonymous signatures).

Chapter 5, Introduction to Zero-Knowledge Protocols, looks at zero-knowledge protocols, which are one of the new fundamental encryption protocols for the new economy of the blockchain. They are very useful for authenticating humans and machines without exposing any sensitive data in an unsafe channel of communication. New protocols, such as zk-SNARK, used in the blockchain are based on these algorithms. Finally, we will present Z/K13, a new protocol in zero knowledge, invented by the author.

Chapter 6, New Algorithms in Public/Private Key Cryptography, presents three algorithms invented by the author. MB09 is based on Fermat's Last Theorem. MB11 could be an alternative to RSA. Digital signatures related to these algorithms are also presented. Moreover we will present MBXX, a new protocol, invented by the author used for consensus.

Chapter 7, Elliptic Curves, looks at elliptic curves, which are the new frontier for decentralized finance. Satoshi Nakamoto adopted a particular kind of elliptic curve to implement the transmission of digital currency in Bitcoins called SECP256K1. Let's see how it works and what the main characteristics of this very robust encryption are.

Chapter 8, Quantum Cryptography, looks at how, with the advent of quantum computing, most of the algorithms we have explored until now will be under serious threat of brute-force attacks. One possible solution is Quantum Cryptography (Q-Cryptography). It is one of the most exhilarating and fantastic kinds of encryption that the human mind has invented. Q-Cryptography is only at the beginning but will be widely adopted in a short time.

Chapter 9, Crypto Search Engine, looks at the crypto search engine, which is an outstanding application of homomorphic encryption, invented by the author. It is a search engine able to search for a query inside encrypted content. We will see how it has been implemented, the story of this enterprise, and the possible applications of this disruptive engine for security and data privacy.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image