Foundations and Trends® in Theoretical Computer Science > Vol 1 > Issue 1

Foundations of Cryptography – A Primer

Oded Goldreich, Department of Computer Science, Weizmann Institute of Science, Israel
Suggested Citation
Oded Goldreich (2005), "Foundations of Cryptography – A Primer", Foundations and Trends® in Theoretical Computer Science: Vol. 1: No. 1, pp 1-116.

Publication Date: 01 Apr 2005
© 2005 O. Goldreich
Cryptography and information security

Free Preview:

Download extract


Login to download a free copy
In this article:
1 Introduction and Preliminaries 
PART I Basic Tools 
2 Computational Difficulty and One-way Functions 
3 Pseudorandomness 
4 Zero-Knowledge 
PART II Basic Applications 
5 Encryption Schemes 
6 Signature and Message Authentication Schemes 
7 General Cryptographic Protocols 


Revolutionary developments which took place in the 1980's have transformed cryptography from a semi-scientific discipline to a respectable field in theoretical Computer Science. In particular, concepts such as computational indistinguishability, pseudorandomness and zero-knowledge interactive proofs were introduced and classical notions as secure encryption and unforgeable signatures were placed on sound grounds. The resulting field of cryptography, reviewed in this survey, is strongly linked to complexity theory (in contrast to "classical" cryptography which is strongly related to information theory).

ISBN: 978-1-933019-02-4
132 pp. $40.00
Buy book (pb)
ISBN: 978-1-933019-52-9
132 pp. $100.00
Buy E-book (.pdf)
Table of contents:
1 Introduction and Preliminaries
Part I Basic Tools
2 Computational difficulty and One-way Functions
3 Pseudorandomness
4 Zero-knowledge
Part II Basic Applications
5 Encryption Schemes
6 Signature and Message Authentication Schemes
7 General Cryptographic Protocols

Foundations of Cryptography

Foundations of Cryptography surveys the main paradigms, approaches and techniques used to conceptualize, define and provide solutions to natural cryptographic problems. The author starts by presenting some of the central tools; that is, computational difficulty (in the form of one-way functions), pseudorandomness, and zero-knowledge proofs. Based on these tools, the emphasis is shifted to the treatment of basic applications such as encryption and signature schemes as well as the design of general secure cryptographic protocols. The author has created a unique overview that includes well over 100 references. The accent is on the clarification of fundamental concepts and on demonstrating the feasibility of solving several central cryptographic problems. Foundations of Cryptography is an invaluable resource for all students, researchers and practitioners interested in the foundations that underpin modern cryptography.