13. Cyptographic Algorithms

  1. Amiya Nayak B.Math., Ph.D. Adjunct Research Professor Associate Editor Full Professor2 and
  2. Ivan Stojmenović Ph.D. Chair Professor founder editor-in-chief2,3
  1. Bimal Roy1 and
  2. Amiya Nayak B.Math., Ph.D. Adjunct Research Professor Associate Editor Full Professor2

Published Online: 1 MAR 2007

DOI: 10.1002/9780470175668.ch13

Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems

Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems

How to Cite

Roy, B. and Nayak, A. (2008) Cyptographic Algorithms, in Handbook of Applied Algorithms: Solving Scientific, Engineering and Practical Problems (eds A. Nayak and I. Stojmenović), John Wiley & Sons, Inc., Hoboken, NJ, USA. doi: 10.1002/9780470175668.ch13

Editor Information

  1. 2

    SITE, University of Ottawa, 800 King Edward Ave., Ottawa, ON K1N 6N5, Canada

  2. 3

    EECE, University of Birmingham, UK

Author Information

  1. 1

    Applied Statistical Unit, Indian Statistical Institute, 203 B.T. Road, Kolkata, India

  2. 2

    SITE, University of Ottawa, 800 King Edward Ave., Ottawa, ON K1N 6N5, Canada

Publication History

  1. Published Online: 1 MAR 2007
  2. Published Print: 14 FEB 2008

ISBN Information

Print ISBN: 9780470044926

Online ISBN: 9780470175668

SEARCH

Keywords:

  • cryptography and cryptographic algorithms;
  • stream ciphers and block cipher;
  • public key cryptography

Summary

Cryptographic algorithms are extremely important for secure communication over an insecure channel and have gained significant importance in modern day technology. First the basic concepts of cryptography are introduced. Then general principles, algorithms and designs for block ciphers, stream ciphers, public key cryptography, and protocol for key-agreement are presented in details. The algorithms largely use mathematical tools from algebra, number theory, and algebraic geometry and have been explained as and when required.