Cryptography.
Annotation
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Aalborg :
River Publishers,
[2017]
|
Colección: | River Publishers series in information science and technology.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
Tabla de Contenidos:
- Front Cover
- Half Title Page
- RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS INFORMATION SCIENCE AND TECHNOLOGY
- Title Page
- Cryptography
- Copyright Page
- Contents
- Acknowledgement
- List of Figures
- List of Tables
- Introduction
- Chapter 1
- Ciphers and Fundamentals
- 1.1 Introduction
- 1.2 Simple Cipher Methods
- 1.2.1 Morse Code
- 1.2.2 Pigpen
- 1.2.3 Rail Code
- 1.2.4 BIFID Cipher
- 1.2.5 Playfair
- 1.2.6 Homophonic Substitution Code
- 1.2.7 Caesar Coding and Scrambled Alphabet
- 1.2.8 Vigenère Cipher
- 1.2.9 One-Time Pad (OTP)
- 1.3 Encoding Methods
- 1.3.1 Hexadecimal and Base-64
- 1.4 Huffman Coding and Lempel-Viz Welsh (LZW)
- 1.5 Data Integrity (CRC-32)
- 1.6 Little Endian or Big Endian
- 1.7 Introduction to Probability and Number Theory
- 1.7.1 Combinations and Permutations
- 1.7.2 Probability Theory
- 1.7.3 Set Theory
- 1.7.4 Number Representations
- 1.7.5 Logarithms
- 1.8 Prime Numbers
- 1.9 Encryption Operators (mod, EX-OR and shift)
- 1.9.1 Mod Operator
- 1.9.2 Shift-Operators
- 1.9.3 Integers and Big Integers
- 1.9.4 X-OR
- 1.9.5 Modulo-2 Operations
- 1.10 GCD
- 1.11 Random Number Generators
- 1.11.1 Linear Congruential Random Numbers
- 1.12 Frequency Analysis
- 1.13 Lab/tutorial
- Chapter 2
- Secret Key Encryption
- 2.1 Introduction
- 2.1.1 Early Days
- 2.1.2 Encryption
- 2.1.3 Secure Communications
- 2.1.4 Modern Methods
- 2.2 Key-based Cryptography
- 2.2.1 Computation Difficulty
- 2.2.2 Stream Encryption and Block Encryption
- 2.2.3 Padding
- 2.3 Brute-Force Analysis
- 2.4 Adding Salt
- 2.4.1 Cipher Block Chaining CBC
- 2.4.2 Cipher Feedback (CFB)
- 2.4.3 Output Feedback (OFB)
- 2.4.4 Counter Mode
- 2.4.5 CBC Example
- 2.5 AES
- 2.5.1 Substitution Bytes (S-box)
- 2.5.2 Shift Row Transformation
- 2.5.3 Mix Column Transformation.
- 2.5.4 Add Round Key Transformation
- 2.6 Secret-Key Encryption
- 2.6.1 DES/3-DES
- 2.6.2 RC4
- 2.6.3 AES/Rijndael
- 2.6.4 IDEA
- 2.6.5 RC5
- 2.6.6 Skipjack
- 2.6.7 Blowfish
- 2.6.8 Twofish
- 2.6.9 Camellia
- 2.6.10 XTEA
- 2.7 Key Entropy
- 2.8 OpenSSL
- 2.9 Pohlog-Hellman
- 2.10 Lab/tutorial
- Chapter 3
- Hashing
- 3.1 Introduction
- 3.2 Hashing Methods
- 3.3 Problems with Hashes
- 3.3.1 Hash Cracking
- 3.4 Salting the Hash Value
- 3.5 Common Hashing Methods
- 3.5.1 LM Hashing
- 3.5.2 APR1 (MD5 with Salt)
- 3.5.3 SHA1, SHA256 and SHA512
- 3.5.4 PHPass
- 3.5.5 Non-Cryptographic Hashes
- 3.6 Authenticating the Sender
- 3.7 HMAC (Hash Message Authentication Code)
- 3.8 Password Hashing
- 3.9 Password Cracking
- 3.10 One Time Passwords
- 3.11 Time Stamp Protocol
- 3.12 Winnowing and Chaffing
- 3.13 SHA-3
- 3.14 Lab/Tutorial
- References
- Chapter 4
- Public Key
- 4.1 Introduction
- 4.2 RSA
- 4.3 Elliptic Curve Ciphers (ECC)
- 4.4 ElGamal
- 4.5 Cramer-Shoup
- 4.6 Paillier Cryptosystem
- 4.7 Knapsack Encryption
- 4.8 Identity-Based Encryption
- 4.9 Lab/Tutorial
- Reference
- Chapter 5
- Key Exchange
- 5.1 Introduction
- 5.2 Diffie-Hellman Key Exchange
- 5.3 Creating the Generator
- 5.4 Diffie-Hellman Examples
- 5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA)
- 5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE)
- 5.7 Diffie-Hellman Weaknesses
- 5.8 Using the Public Key to Pass a Secret Key
- 5.9 Lab/Tutorial
- Chapter 6
- Authentication and Digital Certificates
- 6.1 Introduction
- 6.2 Methods of Authentication
- 6.3 Digital Certificates and PKI
- 6.3.1 PKI and Trust
- 6.3.2 Digital Certificate Types
- 6.3.3 Digital Certificate Reader
- 6.4 Key and Certificate Management
- 6.5 Creating a Signed Certificate
- 6.6 Digital Certificate Passing
- 6.7 Email Encryption
- 6.8 Kerberos.
- 6.9 Kerberos Key Sharing
- 6.10 Lab/Tutorial
- Chapter 7
- Tunneling
- 7.1 Introduction
- 7.2 SSL/TLS Connections
- 7.3 SSL/TLS Handshaking
- 7.4 SSL Risks
- 7.5 VPN Tunnels
- 7.6 IKE
- 7.6.1 Phase 1
- 7.6.2 Phase 2
- 7.7 Tor
- 7.7.1 Tor Encryption
- 7.7.2 Examining Tor Traffic
- 7.8 Lab/Tutorial
- References
- Chapter 8
- Crypto Cracking
- 8.1 Introduction
- 8.2 Key Escrow
- 8.3 Cracking the Code
- 8.4 RSA Cracking
- 8.4.1 RSA Crack with Different e Value
- 8.4.2 Cracking RSA by Factorizing N
- 8.4.3 When Me Is less than N
- 8.4.4 RSA Crack with Chinese Remainder Theory (CRT)
- 8.4.5 Chosen Cipher Attack
- 8.4.6 Blinding Attack
- 8.4.7 Bleichenbacher's Attack
- 8.5 AES Cracking
- 8.5.1 AES Copy-and-Paste
- 8.5.2 AES (Brute Force)
- 8.5.3 AES Cracking with Non-Random Numbers
- 8.6 Digital Certificate Cracking
- 8.7 Lab/Tutorial
- References
- Chapter 9
- Light-weight Cryptography and Other Methods
- 9.1 Introduction
- 9.2 Light-Weight Symmetric Methods
- 9.3 Light-Weight Hashing
- 9.4 Other Light Weight Ciphers
- 9.5 Secret Shares
- 9.6 Post Quantum Cryptography
- 9.7 Lab/Tutorial
- References
- Chapter 10
- Blockchain and Crypto-currency
- 10.1 Introduction
- 10.2 Bitcoins, Blockchain and Miners
- 10.2.1 Bitcoin Transactions
- 10.2.2 Mining Process
- 10.3 Ethereum
- 10.3.1 Gas
- 10.3.2 Practical Implementation of Ethereum
- 10.3.3 Smart Contracts
- 10.4 Lab/Tutorial
- References
- Chapter 11
- Zero-knowledge Proof (ZKP) and Privacy Preserving
- 11.1 Introduction
- 11.2 ZKP: Discrete Logs
- 11.3 Commutative Encryption
- 11.4 Graphs and Hamiltonian Cycles
- 11.5 Feige-Fiat-Shamir
- 11.6 Non-interactive Random Oracle Access for Zero-knowledge Proof
- 11.7 A Fair Coin Flip
- 11.8 ZKP: Paillier
- 11.9 Oblivious Transfer (OT)
- 11.10 Scrambled Circuits
- 11.11 Millionaire's Problem.
- 11.12 RAPPOR
- 11.13 Secure Function Evaluation (SFE)
- 11.14 Secure Remote Password (SRP) Protocol
- 11.15 Lab/Tutorial
- Reference
- Chapter 12
- Wireless Cryptography and Stream Ciphers
- 12.1 Introduction
- 12.2 RC4
- 12.3 WEP
- 12.4 Wi-fi Standards
- 12.5 WPA and WPA-2
- 12.6 WPA-2 Handshaking
- 12.7 Cracking WPA-2 PSK
- 12.8 Stream Ciphers
- 12.9 A5 Ciphers
- 12.9.1 Practical Systems
- 12.9.2 A5/3
- 12.10 Lab/Tutorial
- References
- Appendix A
- Index
- About the Author
- Back Cover.