The Laws of Cryptography:
Table of Contents

by Neal R. Wagner

Copyright © 2001 by Neal R. Wagner. All rights reserved.

NOTE: This site is obsolete. See book draft (in PDF):


Part I: Preliminaries

  1. Cryptographers' Favorites
  2. Cryptographers' Favorite Algorithms
Part II: Coding and Information Theory

  1. Coding and Information Theory
  2. Visualizing Channel Capacity
  3. The Huffman Code for Compression
  4. The Hamming Code for Error Correction
  5. Coping with Decimal Numbers
  6. Verhoeff's Decimal Error Detection
Part III: Introduction to Cryptography

  1. Cryptograms and Terminology
  2. The One-Time Pad
  3. Conventional Block Cipher Cryptosystems
  4. Conventional Stream Cipher Cryptosystems
Part IV: Public Key Cryptography

  1. Public Key Distribution Systems
  2. Public Key Cryptography
  3. The RSA Cryptosystem
  4. Rabin's Version of RSA
  5. Elliptic Curve Cryptosystems
  6. Other Public Key Cryptosystems
Part V: Random Number Generation

  1. Traditional Random Number Generators
  2. Perfect Random Number Generators
  3. Random Numbers From Chaos Theory
Part VI: The Advanced Encryption Standard (AES)

  1. Introduction to the AES
  2. The Finite Field GF(256)
    Unsigned Bytes in Java
    Using Printed Log Tables
  3. The S-Boxes
  4. Key Expansion
  5. Encryption
  6. Decryption
Part VII: Hash Functions and Digital Signatures

  1. Hash Functions
  2. Cryptographically Secure Hash Functions
  3. Digital Signatures

Part VIII: Randomization Techniques

  1. Simple Randomization
  2. More Complex Tricks
  3. The Rip van Winkle Cipher and Rabin's Scheme

Part IX: Key distribution and Threshold Schemes

  1. Introduction
  2. Symmetric-key Distribution Systems Using Trusted Third Parties
  3. Public Key Distribution Systems Without Trusted Third Parties
  4. Threshold Schemes

Appendix A: Java Programs

Appendix B: Projects


Revision date: 2002-02-25. (Please use ISO 8601, the International Standard.)