000 05419nam a22006375i 4500
001 978-1-0716-0987-3
003 DE-He213
005 20240423125323.0
007 cr nn 008mamaa
008 200930s2020 xxu| s |||| 0|eng d
020 _a9781071609873
_9978-1-0716-0987-3
024 7 _a10.1007/978-1-0716-0987-3
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
100 1 _aDing, Jintai.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aMultivariate Public Key Cryptosystems
_h[electronic resource] /
_cby Jintai Ding, Albrecht Petzoldt, Dieter S. Schmidt.
250 _a2nd ed. 2020.
264 1 _aNew York, NY :
_bSpringer US :
_bImprint: Springer,
_c2020.
300 _aXXV, 253 p. 30 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aAdvances in Information Security,
_x2512-2193 ;
_v80
505 0 _aIntroduction -- Multivariate Cryptography -- The Matsumoto-Imai Cryptosystem -- Hidden Field Equations -- Oil and Vinegar -- MQDSS -- The SimpleMatrix Encryption Scheme -- Solving Polynomial Systems.
520 _aThis book discusses the current research concerning public key cryptosystems. It begins with an introduction to the basic concepts of multivariate cryptography and the history of this field. The authors provide a detailed description and security analysis of the most important multivariate public key schemes, including the four multivariate signature schemes participating as second round candidates in the NIST standardization process for post-quantum cryptosystems. Furthermore, this book covers the Simple Matrix encryption scheme, which is currently the most promising multivariate public key encryption scheme. This book also covers the current state of security analysis methods for Multivariate Public Key Cryptosystems including the algorithms and theory of solving systems of multivariate polynomial equations over finite fields. Through the book’s website, interested readers can find source code to the algorithms handled in this book. In 1994, Dr. Peter Shor from Bell Laboratories proposed a quantum algorithm solving the Integer Factorization and the Discrete Logarithm problem in polynomial time, thus making all of the currently used public key cryptosystems, such as RSA and ECC insecure. Therefore, there is an urgent need for alternative public key schemes which are resistant against quantum computer attacks. Researchers worldwide, as well as companies and governmental organizations have put a tremendous effort into the development of post-quantum public key cryptosystems to meet this challenge. One of the most promising candidates for this are Multivariate Public Key Cryptosystems (MPKCs). The public key of an MPKC is a set of multivariate polynomials over a small finite field. Especially for digital signatures, numerous well-studied multivariate schemes offering very short signatures and high efficiency exist. The fact that these schemes work over small finite fields, makes them suitable not only for interconnected computer systems,but also for small devices with limited resources, which are used in ubiquitous computing. This book gives a systematic introduction into the field of Multivariate Public Key Cryptosystems (MPKC), and presents the most promising multivariate schemes for digital signatures and encryption. Although, this book was written more from a computational perspective, the authors try to provide the necessary mathematical background. Therefore, this book is suitable for a broad audience. This would include researchers working in either computer science or mathematics interested in this exciting new field, or as a secondary textbook for a course in MPKC suitable for beginning graduate students in mathematics or computer science. Information security experts in industry, computer scientists and mathematicians would also find this book valuable as a guide for understanding the basic mathematical structures necessary to implement multivariate cryptosystems for practical applications.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aQuantum computers.
650 0 _aData protection.
650 0 _aComputer science
_xMathematics.
650 0 _aComputer science.
650 1 4 _aCryptology.
650 2 4 _aQuantum Computing.
650 2 4 _aData and Information Security.
650 2 4 _aSymbolic and Algebraic Manipulation.
650 2 4 _aTheory of Computation.
700 1 _aPetzoldt, Albrecht.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
700 1 _aSchmidt, Dieter S.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9781071609859
776 0 8 _iPrinted edition:
_z9781071609866
830 0 _aAdvances in Information Security,
_x2512-2193 ;
_v80
856 4 0 _uhttps://doi.org/10.1007/978-1-0716-0987-3
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
942 _cSPRINGER
999 _c176670
_d176670