Cryptography References
The following is a list of references that I have found useful. It is
by no means exhaustive. The books are listed first and then the
journal articles. They range from the expository to the very mathematical.
Cryptology Books:
- Bauer, Friedrich. Decrypted Secrets: Methods and Maxims of
Cryptology. Fourth Edition. Springer, 2006.
- Flanner, Sarah, with David Flannery. In Code: A Mathematical
Journey. Chapel Hill, NC: Algonquin Books of Chapel Hill, 2002.
- Gaines, Hellen F. Cryptanalysis: a study of ciphers and their solutions.
Dover, 1989.
- Lewand, Robert F. Cryptological Mathematics. Mathematical
Association of America, 2009.
- Schneier, Bruce. Applied Cryptography. Second Edition.
John Wiley & Sons, 1996.
- Sinkov, Abraham. Elementary Cryptanalysis. Second Edition.
Mathematical Association of America, 2009.
- Singh, Simon. The Code Book: The Science of Secrecy from
Ancient Egypt to Quantum Cryptography. New York: Anchor Books, 2000.
- Van Assche, Giles. Quantum Cryptography and Secret-Key Distillation.
Cambridge UP, 2006.
Mathematical Cryptography & Number Theory References:
- Hoffstein, J., Pipher, J., Silverman, J.H. An Introduction
to Mathematical Cryptography. Springer, 2009.
- Koblitz, Neal. A Course in Number Theory and Cryptography.
2nd Edition. New York: Springer-Verlag, 1994.
- Rosen, Kenneth H. Elementary Number Theory and its appications.
Fifth Edition. Boston: Pearson Addison-Wesley, 2005.
Seminal Journal Articles:
The articles listed in this section each mark a major advance
in 20th century cryptography. I have also listed the original
papers developing the Hill Cipher in this section.
- Diffie, W., and M.E. Hellman. New Directions in Cryptography.
IEEE Transactions on Information Theory 22, no. 6(November 1976): 644-654
- Elgamal, T. A Public Key Cryptosystem and a Signature Scheme
Based on Discrete Logarithms. IEEE Transactions on Information Theory 31,
no. 4(July 1985): 469-472
- Hellman, M.E. An Overview of Public Key Cryptograhpy.
IEEE Communications Magazine, 50th Anniversary Commemorative
Issue(May 2002): 42-29
- Hill, L.S. Concerning Certain Linear Transformation Apparatus
of Cryptography. The American Mathematical Monthly
(Mathematical Association of America), no.3(March 1931): 135-154
- Hill, L.S. Cryptography in an Algebraic Alphabet. The American
Mathematical Monthly (Mathematical Association of America)
65, no. 6(June-July 1929): 306-312
- Levine, Jack. Variable Matrix Substitution in Algebraic Cryptography.
The American Matheamtical Monthly (Mathematial Association of America)
65, no. 3(March 1938): 170-179
- Merkle, R.C., and M.E. Hellman. Hiding Information and Signatures
in Trapdoor Knapsacks. IEEE Transactions on Information Theory.
24, no. 5 (September 1978): 525-530
- Rivest, R.C., A. Shamir, and L. Adleman. A Method for Obtaining
Digital Signatures and Public-Key Cryptostystems. Communications
of the ACM 21, no. 2 (February 1978): 120 - 126.
Expository Journal Articles:
The articles in this section are all non-technical in nature. They
can be read by anyone intersted in obtaining a background in Cryptology.
The Blake-Wilson paper is an examination of the interdisciplinary nature
of the subject. The Diffie-Hellman paper is an overview of classical
cryptography through early digital methods and contains an extensive
bibliography. The Koblitz-Menzes paper is a reveiw of modern digital
cryptography, and they cover topics such as RSA, Elliptic Curves, and Braid Groups.
- Blake-Wilson, S. Information Security, Mathematics, and Public-Key
Cryptography. Designs, Codes, and Cryptography
(Kluwer Academic Publishers) 19(2000): 77-99.
- Diffie, W., and M.E. Hellman. Privacy and Authentication: An
Introduction to Cryptography. Proceedings of the IEEE
67, no. 3 (March 1979): 397 - 427
- Koblitz, N., and A.J. Menezes. A Survey of Public-Key Cryptosystems.
SIAM Review (Society for Industrial and Appied Mathematics)
46, no. 4 (December 2004): 599-634.
Journal Articles on RSA:
- Boneh, D. Twenty Years of Attacks on the RSA Cryptosystem.
Notices of the AMS 46, no. 2(February 1999): 203-213
- Brincat, K. On the Use of RSA as a Secret Key Cryptosystem.
Designs, Codes and Cryptography(Kluwer Academic Publishers),
2001: 317-328
- Shamir, A. How to Share a Secret. Communications of the ACM
22, no. 11 (November 1979): 612-613
Journal Articles on Knapsack Ciphers:
- Odlyzko, A. The Rise and Fall of Knapsack Cryptosystems. in
Cryptology and Computational Number Theory, Proceedings Symposia
Applied Mathematics. Providence: AMS, 1990. 75-88.
Mathematical Journal Articles:
These articles are heavy on the mathematics. A background in abstract algebra
and number theory is required to understand them. In particular, one should be
familiar with fields of characteristic p. These are each well-known
articles in mathematical cryptology.
- Blomer, J, and A. May. A Generalized Wiener Attack on RSA.
In PKC 2004, LNCS 2947, edited by F. Bao and et al., 1-13. 2004.
- Nguyen, P.Q., J. Stern. The Two Faces of Lattices in Cryptology in
CaLC 2001, LNCS 2146, edited by J.H. Silverman, 146-180. Berlin-Heidelberg:
Springer-Verlag, 2001.
- Pohlig, S., and M.E. Hellman. An Improved Algorithm for Computing Logarithms
over GF(p) and its Cryptographyic Significance. IEEE Transactions on
Information Theory 24, no. 1 (January 1978): 106-110.
- Wiener, M.J. Cryptanalysis of Short RSA Secret Exponents. IEEE
Transactions on Information Theory 36, no. 3 (May 1990): 553-558.