Literature
The sources listed here help deepening your knowledge – they are by no means comprehensive.
A number of sources were used during the development of CrypTool.
The online help available within CrypTool exhaustively explains the classic encryption algorithms. Mostly the online help doesn't go deeply into the modern encryption algorithms due to their complexity.
Further information and further sources concerning also the modern cryptographic algorithms can be found within single articles of the CrypTool script and within the "Links" section on the CrypTool web site.
The following lists of references are alphabetically sorted.
Books about cryptography, cryptanalysis and number theory
- Albrecht Beutelspacher: "Geheimsprachen", 1997, Beck.
- Albrecht Beutelspacher, Jörg Schwenk, Klaus-Dieter Wolfenstetter: "Moderne Verfahren der Kryptographie", 1995, Vieweg.
- Johannes Buchmann: "Introduction to Cryptography", 2nd ed, 2004, Springer.
- Walter Fumy, Hans Peter Riess: "Kryptographie, Entwurf, Einsatz und Analyse symmetrischer Kryptoverfahren", 1994, Oldenbourg.
- Peter Bundschuh: "Einführung in die Zahlentheorie", 4th ed, 1998, Springer.
- Paul Garrett: "Making, Breaking Codes: Introduction to Cryptology", first edition, 2001, Prentice Hall.
- Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone: "Handbook of Applied Cryptography", 1997, CRC Press.
- Rolf Oppliger, "Contemporary Cryptography", 2005, Artech House.
- Arto Salomaa: "Public-Key Cryptography", 1990, Springer.
- Klaus Schmeh: "Cryptography and Public Key Infrastructures on the Internet", 2003, John Wiley & Sons Ltd.
[A considerable, up-to-date, easy to read book, which also considers practical problems like standardisation or real existing software].
- Klaus Schmeh: "Kryptografie", 2007, dpunkt.
- Bruce Schneier: "Applied Cryptography", Protocols, Algorithms and Source Code in C, second edition, 1996, Wiley.
- Victor Shoup: "A Computational Introduction to Number Theory and Algebra", 2005, Cambridge University Press
http://shoup.net/ntb/
- Simon Singh: "The Codebook", 1999, Doubleday
[very thrilling book – more historically oriented than mathematically].
- Mark Stamp, Richard M. Low. "Applied Cryptanalysis: Breaking Ciphers in the Real World", 2007, Wiley-Interscience
[The according website has a lot of powerpoint slides and challenge problems.]
http://cs.sjsu.edu/faculty/stamp/crypto
- Douglas R. Stinson: "Cryptography, Theory and Practice", 1995, CRC Press.
- Reinhard Wobst: "Abenteuer Kryptologie", 1998, Addison-Wesley.
Articles about cryptography in journals
Books about elliptic curves
As there is little information on elliptic curves in the references provided above, a list of additional works specifically on the subject of elliptic curves is provided below.
- Ian Blake, Gadiel Seroussi, Nigel Smart: "Elliptic Curves in Cryptography", Cambridge University Press, 1999.
- N. Koblitz: "A Course in Number Theory and Cryptography", Springer-Verlag, 2nd edition, 1994.
- A.J. Menezes: "Elliptic Curve Public Key Cryptosystems", Kluwer Academic Publishers, 1993.
Journal articles and white papers about elliptic curves
- cv cryptovision: "Whitepaper ECC" (Cryptovision website, http://www.cryptovision.com, path: sitemap, technology, white papers)
http://cryptovision.com/fileadmin/technologie/WP_ECC_a.pdf
- Certicom: "Elliptic Curve Cryptosystem Tutorials and Whitepapers".
http://www.certicom.com.
- Jurišic und A. Menezes: "Elliptic Curves and Cryptography". Dr. Dobb‚s Journal, April 1997, pp 26-35.
- N. Koblitz: "Elliptic Curve cryptosystems". Mathematics of Computation 48, pp 203-209, 1987.
- A.J. Menezes, T. Okamoto und S.A. Vanstone: "Reducing elliptic curve logarithms to logarithms in a finite field". IEEE Transactions on Information Theory 39, pp 1639-1646, 1993.
- A.J. Menezes: "Elliptic Curve Cryptosystems". Crypto Bytes vol. 1 no.2 (1995), RSA Laboratories, ftp://ftp.rsa.com/pub/cryptobytes/crypto1n2.pdf.
- V. Miller: "Uses of elliptic curves in cryptography". In Advances in Cryptology: Crypto ‚85, Lecture Notes in Computer Science 218 (1986), pp 417-426.
- V. Müller und S. Paulus: "Elliptische Kurven und Public Key-Kryptographie". Datenschutz und Datensicherheit 22 (1998), pp 496-503.
- K. Nyberg und R.Rueppel: "A new signature scheme based on the DSA giving message recovery". First ACM Conference on Computer and Communications Security (1993), ACM Press, pp 58-61.
- K. Nyberg und R.Rueppel: "Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem". Designs, Codes and Cryptography, 7, pp 61-81, 1996.
Standard specifications for elliptic curve cryptography:
- IEEE P1363 "Standard Specifications for Public Key Cryptography" (provisional working version 8, October 1998), http://grouper.ieee.org/groups/1363.
- Working Draft American National Standard X9.62-1998 "Public Key Cryptography For The Financial Services Industry: The Elliptic Curve Digital Signature Algorithm (ECDSA)", September 1998.
- Working Draft American National Standard X9.63-199x "Public Key Cryptography For The Financial Services Industry: Key Agreement and Key Transport Using Elliptic Curve Cryptography", January 1999.
Links to the Enigma machine
The Word War II Enigma machine is addressed in an especially large number of references and versions on the Internet.
IT-Security in general
A huge number of books exists here, too. This is only a small selection:
- Matt Bishop, "Computer Security. Art and Science", 2003, Addison-Wesley.
- Claudia Eckert, "IT-Sicherheit", 4th ed, 2006, Oldenbourg
[very complete and actual book, but yet only available in German].
- P. Fites / M.P.J. Kratz, "Information Systems Security", 1993, Van Nostrand Reinhold.
- W. Ford / M. S. Baum, "Secure Electronic Commerce", 2nd ed, 2001, Prentice Hall.
- S. Garfinkel / G. Spafford, "Web Security & Commerce", 1997, O´Reilly & Associates.
- W. Hornberger / J. Schneider, "Sicherheit und Datenschutz mit SAP-Systemen", 2000, Galileo Press.
- G. Kurtz, S. McClure, J. Scambray, "Das Anti-Hacker-Buch", 1st ed., 2000, MITP.
- Rolf Oppliger, "IT-Sicherheit", 1997, Vieweg.
- C.P. Pfleeger / S.L. Pfleeger, "Security in Computing", 3rd ed., 2003, Prentice Hall.
- Ryan Russell / Stace Cunningham: "Das Hacker-Buch", 2001, bhv.
- Ryan Russell / Stace Cunningham: "Hack Proofing your Network", 2000, Osborne/MacGraw-Hill
[the original of the German book above: very clear and understandable for everybody].
- Udo Ulfkotte, "Wirtschaftsspionage", 2001, Goldmann.