Mathematical Foundations of Public Key Cryptography  book cover
1st Edition

Mathematical Foundations of Public Key Cryptography

ISBN 9781498702232
Published October 21, 2015 by CRC Press
252 Pages

SAVE ~ $18.99
was $94.95
USD $75.96

Prices & shipping based on shipping country


Book Description

In Mathematical Foundations of Public Key Cryptography, the authors integrate the results of more than 20 years of research and teaching experience to help students bridge the gap between math theory and crypto practice. The book provides a theoretical structure of fundamental number theory and algebra knowledge supporting public-key cryptography.

Rather than simply combining number theory and modern algebra, this textbook features the interdisciplinary characteristics of cryptography—revealing the integrations of mathematical theories and public-key cryptographic applications. Incorporating the complexity theory of algorithms throughout, it introduces the basic number theoretic and algebraic algorithms and their complexities to provide a preliminary understanding of the applications of mathematical theories in cryptographic algorithms.

Supplying a seamless integration of cryptography and mathematics, the book includes coverage of elementary number theory; algebraic structure and attributes of group, ring, and field; cryptography-related computing complexity and basic algorithms, as well as lattice and fundamental methods of lattice cryptanalysis.

The text consists of 11 chapters. Basic theory and tools of elementary number theory, such as congruences, primitive roots, residue classes, and continued fractions, are covered in Chapters 1-6. The basic concepts of abstract algebra are introduced in Chapters 7-9, where three basic algebraic structures of groups, rings, and fields and their properties are explained.

Chapter 10 is about computational complexities of several related mathematical algorithms, and hard problems such as integer factorization and discrete logarithm. Chapter 11 presents the basics of lattice theory and the lattice basis reduction algorithm—the LLL algorithm and its application in the cryptanalysis of the RSA algorithm.

Containing a number of exercises on key algorithms, the book is suitable for use as a textbook for undergraduate students and first-year graduate students in information security programs. It is also an ideal reference book for cryptography professionals looking to master public-key cryptography.

Table of Contents

Divisibility of Integers. Congruences. Congruence Equations. Exponents and Primitive Roots. Some Elementary Results for Prime Distribution. Simple Continued Fractions. Basic Concepts. Group Theory. Rings and Fields. Some Mathematical Problems in Public Key Cryptography. Basics of Lattices. References. Further Reading. Index.

View More



Dr. Xiaoyun Wang is a professor at the Institute of Advanced Study, Tsinghua University, China. She is also the director of the Center for Cryptology Study at Tsinghua University and an adjunct professor in the Key Lab of Cryptographic Technology and Information Security at Shandong University, China.

Dr. Guangwu Xu is an associate professor in the Department of Electrical Engineering and Computer Science, University of Wisconsin-Milwaukee. Dr. Xu’s research concerns the efficiency, security, and reliability of information processing. He is interested in the fundamental problems of these aspects.

Dr. Mingqiang Wang earned his PhD degree in 2004 from Shandong University, China where he serves as a professor now. Dr. Wang is a member of the Chinese Association for Cryptologic Research, his research focuses on number theory and analysis and design of public key algorithms.

Dr. Xianmeng Meng earned her bachelor's and master's degrees from Jilin University in 1993 and 1996 respectively, then graduated with a PhD degree from Shandong University, China. She is a member of the Chinese Association for Cryptologic Research and is currently a professor in Shandong University of Finance and Economics, her main research interest is number theory and cryptography.