Cargando…

Cryptography.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Buchanan, William (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, [2017]
Colección:River Publishers series in information science and technology.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_on1005010397
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 170930s2017 xx ob 001 0 eng d
040 |a EBLCP  |b eng  |e rda  |e pn  |c EBLCP  |d YDX  |d MERUC  |d OCLCO  |d IDB  |d OCLCQ  |d OCLCO  |d OCLCF  |d OSU  |d EZ9  |d OCLCQ  |d WYU  |d LVT  |d OCLCQ  |d UKAHL  |d UX1  |d K6U  |d OCLCQ  |d SDF  |d OCLCO  |d OCLCQ  |d EBLCP  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1004826395 
020 |a 9788793609143  |q (ebook) 
020 |a 8793609140  |q (ebook) 
020 |z 9788793379107  |q (hardcover) 
020 |z 8793379102  |q (print) 
029 1 |a AU@  |b 000066433468 
035 |a (OCoLC)1005010397  |z (OCoLC)1004826395 
050 4 |a QA76.9.A25  |b B83 2017 
082 0 4 |a 005.8/24  |2 23 
049 |a UAMI 
100 1 |a Buchanan, William,  |e author. 
245 1 0 |a Cryptography. 
264 1 |a Aalborg :  |b River Publishers,  |c [2017] 
264 4 |c ©2017 
300 |a 1 online resource (xxi, 402 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a River Publishers Series in Information Science and Technology 
504 |a Includes bibliographical references at the end of each chapters and index. 
588 0 |a Print version record. 
505 0 |a Front Cover -- Half Title Page -- RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS INFORMATION SCIENCE AND TECHNOLOGY -- Title Page -- Cryptography -- Copyright Page -- Contents -- Acknowledgement -- List of Figures -- List of Tables -- Introduction -- Chapter 1 -- Ciphers and Fundamentals -- 1.1 Introduction -- 1.2 Simple Cipher Methods -- 1.2.1 Morse Code -- 1.2.2 Pigpen -- 1.2.3 Rail Code -- 1.2.4 BIFID Cipher -- 1.2.5 Playfair -- 1.2.6 Homophonic Substitution Code -- 1.2.7 Caesar Coding and Scrambled Alphabet -- 1.2.8 Vigenère Cipher -- 1.2.9 One-Time Pad (OTP) -- 1.3 Encoding Methods -- 1.3.1 Hexadecimal and Base-64 -- 1.4 Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5 Data Integrity (CRC-32) -- 1.6 Little Endian or Big Endian -- 1.7 Introduction to Probability and Number Theory -- 1.7.1 Combinations and Permutations -- 1.7.2 Probability Theory -- 1.7.3 Set Theory -- 1.7.4 Number Representations -- 1.7.5 Logarithms -- 1.8 Prime Numbers -- 1.9 Encryption Operators (mod, EX-OR and shift) -- 1.9.1 Mod Operator -- 1.9.2 Shift-Operators -- 1.9.3 Integers and Big Integers -- 1.9.4 X-OR -- 1.9.5 Modulo-2 Operations -- 1.10 GCD -- 1.11 Random Number Generators -- 1.11.1 Linear Congruential Random Numbers -- 1.12 Frequency Analysis -- 1.13 Lab/tutorial -- Chapter 2 -- Secret Key Encryption -- 2.1 Introduction -- 2.1.1 Early Days -- 2.1.2 Encryption -- 2.1.3 Secure Communications -- 2.1.4 Modern Methods -- 2.2 Key-based Cryptography -- 2.2.1 Computation Difficulty -- 2.2.2 Stream Encryption and Block Encryption -- 2.2.3 Padding -- 2.3 Brute-Force Analysis -- 2.4 Adding Salt -- 2.4.1 Cipher Block Chaining CBC -- 2.4.2 Cipher Feedback (CFB) -- 2.4.3 Output Feedback (OFB) -- 2.4.4 Counter Mode -- 2.4.5 CBC Example -- 2.5 AES -- 2.5.1 Substitution Bytes (S-box) -- 2.5.2 Shift Row Transformation -- 2.5.3 Mix Column Transformation. 
505 8 |a 2.5.4 Add Round Key Transformation -- 2.6 Secret-Key Encryption -- 2.6.1 DES/3-DES -- 2.6.2 RC4 -- 2.6.3 AES/Rijndael -- 2.6.4 IDEA -- 2.6.5 RC5 -- 2.6.6 Skipjack -- 2.6.7 Blowfish -- 2.6.8 Twofish -- 2.6.9 Camellia -- 2.6.10 XTEA -- 2.7 Key Entropy -- 2.8 OpenSSL -- 2.9 Pohlog-Hellman -- 2.10 Lab/tutorial -- Chapter 3 -- Hashing -- 3.1 Introduction -- 3.2 Hashing Methods -- 3.3 Problems with Hashes -- 3.3.1 Hash Cracking -- 3.4 Salting the Hash Value -- 3.5 Common Hashing Methods -- 3.5.1 LM Hashing -- 3.5.2 APR1 (MD5 with Salt) -- 3.5.3 SHA1, SHA256 and SHA512 -- 3.5.4 PHPass -- 3.5.5 Non-Cryptographic Hashes -- 3.6 Authenticating the Sender -- 3.7 HMAC (Hash Message Authentication Code) -- 3.8 Password Hashing -- 3.9 Password Cracking -- 3.10 One Time Passwords -- 3.11 Time Stamp Protocol -- 3.12 Winnowing and Chaffing -- 3.13 SHA-3 -- 3.14 Lab/Tutorial -- References -- Chapter 4 -- Public Key -- 4.1 Introduction -- 4.2 RSA -- 4.3 Elliptic Curve Ciphers (ECC) -- 4.4 ElGamal -- 4.5 Cramer-Shoup -- 4.6 Paillier Cryptosystem -- 4.7 Knapsack Encryption -- 4.8 Identity-Based Encryption -- 4.9 Lab/Tutorial -- Reference -- Chapter 5 -- Key Exchange -- 5.1 Introduction -- 5.2 Diffie-Hellman Key Exchange -- 5.3 Creating the Generator -- 5.4 Diffie-Hellman Examples -- 5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7 Diffie-Hellman Weaknesses -- 5.8 Using the Public Key to Pass a Secret Key -- 5.9 Lab/Tutorial -- Chapter 6 -- Authentication and Digital Certificates -- 6.1 Introduction -- 6.2 Methods of Authentication -- 6.3 Digital Certificates and PKI -- 6.3.1 PKI and Trust -- 6.3.2 Digital Certificate Types -- 6.3.3 Digital Certificate Reader -- 6.4 Key and Certificate Management -- 6.5 Creating a Signed Certificate -- 6.6 Digital Certificate Passing -- 6.7 Email Encryption -- 6.8 Kerberos. 
505 8 |a 6.9 Kerberos Key Sharing -- 6.10 Lab/Tutorial -- Chapter 7 -- Tunneling -- 7.1 Introduction -- 7.2 SSL/TLS Connections -- 7.3 SSL/TLS Handshaking -- 7.4 SSL Risks -- 7.5 VPN Tunnels -- 7.6 IKE -- 7.6.1 Phase 1 -- 7.6.2 Phase 2 -- 7.7 Tor -- 7.7.1 Tor Encryption -- 7.7.2 Examining Tor Traffic -- 7.8 Lab/Tutorial -- References -- Chapter 8 -- Crypto Cracking -- 8.1 Introduction -- 8.2 Key Escrow -- 8.3 Cracking the Code -- 8.4 RSA Cracking -- 8.4.1 RSA Crack with Different e Value -- 8.4.2 Cracking RSA by Factorizing N -- 8.4.3 When Me Is less than N -- 8.4.4 RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5 Chosen Cipher Attack -- 8.4.6 Blinding Attack -- 8.4.7 Bleichenbacher's Attack -- 8.5 AES Cracking -- 8.5.1 AES Copy-and-Paste -- 8.5.2 AES (Brute Force) -- 8.5.3 AES Cracking with Non-Random Numbers -- 8.6 Digital Certificate Cracking -- 8.7 Lab/Tutorial -- References -- Chapter 9 -- Light-weight Cryptography and Other Methods -- 9.1 Introduction -- 9.2 Light-Weight Symmetric Methods -- 9.3 Light-Weight Hashing -- 9.4 Other Light Weight Ciphers -- 9.5 Secret Shares -- 9.6 Post Quantum Cryptography -- 9.7 Lab/Tutorial -- References -- Chapter 10 -- Blockchain and Crypto-currency -- 10.1 Introduction -- 10.2 Bitcoins, Blockchain and Miners -- 10.2.1 Bitcoin Transactions -- 10.2.2 Mining Process -- 10.3 Ethereum -- 10.3.1 Gas -- 10.3.2 Practical Implementation of Ethereum -- 10.3.3 Smart Contracts -- 10.4 Lab/Tutorial -- References -- Chapter 11 -- Zero-knowledge Proof (ZKP) and Privacy Preserving -- 11.1 Introduction -- 11.2 ZKP: Discrete Logs -- 11.3 Commutative Encryption -- 11.4 Graphs and Hamiltonian Cycles -- 11.5 Feige-Fiat-Shamir -- 11.6 Non-interactive Random Oracle Access for Zero-knowledge Proof -- 11.7 A Fair Coin Flip -- 11.8 ZKP: Paillier -- 11.9 Oblivious Transfer (OT) -- 11.10 Scrambled Circuits -- 11.11 Millionaire's Problem. 
505 8 |a 11.12 RAPPOR -- 11.13 Secure Function Evaluation (SFE) -- 11.14 Secure Remote Password (SRP) Protocol -- 11.15 Lab/Tutorial -- Reference -- Chapter 12 -- Wireless Cryptography and Stream Ciphers -- 12.1 Introduction -- 12.2 RC4 -- 12.3 WEP -- 12.4 Wi-fi Standards -- 12.5 WPA and WPA-2 -- 12.6 WPA-2 Handshaking -- 12.7 Cracking WPA-2 PSK -- 12.8 Stream Ciphers -- 12.9 A5 Ciphers -- 12.9.1 Practical Systems -- 12.9.2 A5/3 -- 12.10 Lab/Tutorial -- References -- Appendix A -- Index -- About the Author -- Back Cover. 
520 8 |a Annotation  |b Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs. Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs. This book provides extensive support through the associated website of: http: //asecuritysite.com/encryption. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Data encryption (Computer science) 
650 6 |a Chiffrement (Informatique) 
650 7 |a Data encryption (Computer science)  |2 fast 
655 0 |a Electronic books. 
758 |i has work:  |a Cryptography (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGXMDmVcj6vxBkdMb7GbVC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Buchanan, William.  |t Cryptography.  |d Aalborg : River Publishers, ©2017  |z 9788793379107 
830 0 |a River Publishers series in information science and technology. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=30251706  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5050193  |z Texto completo 
936 |a BATCHLOAD 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL30251706 
938 |a Askews and Holts Library Services  |b ASKH  |n AH34854347 
938 |a YBP Library Services  |b YANK  |n 18105880 
938 |a YBP Library Services  |b YANK  |n 14828525 
994 |a 92  |b IZTAP