© 2019

Cybercryptography: Applicable Cryptography for Cyberspace Security


  • Offers Unifying theory and practice

  • Covers combining security-key and public-key techniques

  • Discusses defensive and offensive cryptography

  • Applicable to cyberspace security

  • Accessible to a wide range of audiences


Table of contents

  1. Front Matter
    Pages i-xi
  2. Song Y. Yan
    Pages 1-20
  3. Song Y. Yan
    Pages 21-141
  4. Song Y. Yan
    Pages 143-172
  5. Song Y. Yan
    Pages 173-216
  6. Song Y. Yan
    Pages 217-286
  7. Song Y. Yan
    Pages 287-341
  8. Song Y. Yan
    Pages 343-398
  9. Song Y. Yan
    Pages 399-412
  10. Song Y. Yan
    Pages 413-429
  11. Back Matter
    Pages 431-436

About this book


This book provides the basic theory, techniques, and algorithms of modern cryptography that are applicable to network and cyberspace security. It consists of the following nine main chapters: Chapter 1 provides the basic concepts and ideas of cyberspace and cyberspace security, Chapters 2 and 3 provide an introduction to mathematical and computational preliminaries, respectively.

 Chapters 4 discusses the basic ideas and system of secret-key cryptography, whereas Chapters 5, 6, and 7 discuss the basic ideas and systems of public-key cryptography based on integer factorization, discrete logarithms, and elliptic curves, respectively. Quantum-safe cryptography is presented  in Chapter 8 and offensive cryptography, particularly cryptovirology, is covered in Chapter 9.

 This book can be used as a secondary text for final-year undergraduate students and first-year postgraduate students for courses in Computer, Network, and Cyberspace Security. Researchers and practitioners working in cyberspace security and network security will also find this book useful as a reference.


Cyberspace and Cybersecurity Number Theory Abstract Algebra Computation Theory Secret-Key Cryptography Public-Key Cryptography Cryptoanalysis Digital Signatures Quantum Computing and Quantum Cryptography Quantum-Safe Cryptography Offensive Cryptography and Cryptovirology

Authors and affiliations

  1. 1.Xingzhi CollegeZhejiang Normal UniversityJinhuaChina

Bibliographic information

Industry Sectors
IT & Software
Finance, Business & Banking


“This is a nice textbook for students who want a quick overview of modern cryptosystems. It will also be useful for researchers and professionals working in cybersecurity. The book is easy to read. I strongly recommend it.” (Manish Gupta, Computing Reviews, May 03, 2019)