Cargando…

Cryptography.

Annotation

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Buchanan, William (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Aalborg : River Publishers, [2017]
Colección:River Publishers series in information science and technology.
Temas:
Acceso en línea:Texto completo
Texto completo
Tabla de Contenidos:
  • Front Cover
  • Half Title Page
  • RIVER PUBLISHERS SERIES IN SECURITY AND DIGITAL FORENSICS INFORMATION SCIENCE AND TECHNOLOGY
  • Title Page
  • Cryptography
  • Copyright Page
  • Contents
  • Acknowledgement
  • List of Figures
  • List of Tables
  • Introduction
  • Chapter 1
  • Ciphers and Fundamentals
  • 1.1 Introduction
  • 1.2 Simple Cipher Methods
  • 1.2.1 Morse Code
  • 1.2.2 Pigpen
  • 1.2.3 Rail Code
  • 1.2.4 BIFID Cipher
  • 1.2.5 Playfair
  • 1.2.6 Homophonic Substitution Code
  • 1.2.7 Caesar Coding and Scrambled Alphabet
  • 1.2.8 Vigenère Cipher
  • 1.2.9 One-Time Pad (OTP)
  • 1.3 Encoding Methods
  • 1.3.1 Hexadecimal and Base-64
  • 1.4 Huffman Coding and Lempel-Viz Welsh (LZW)
  • 1.5 Data Integrity (CRC-32)
  • 1.6 Little Endian or Big Endian
  • 1.7 Introduction to Probability and Number Theory
  • 1.7.1 Combinations and Permutations
  • 1.7.2 Probability Theory
  • 1.7.3 Set Theory
  • 1.7.4 Number Representations
  • 1.7.5 Logarithms
  • 1.8 Prime Numbers
  • 1.9 Encryption Operators (mod, EX-OR and shift)
  • 1.9.1 Mod Operator
  • 1.9.2 Shift-Operators
  • 1.9.3 Integers and Big Integers
  • 1.9.4 X-OR
  • 1.9.5 Modulo-2 Operations
  • 1.10 GCD
  • 1.11 Random Number Generators
  • 1.11.1 Linear Congruential Random Numbers
  • 1.12 Frequency Analysis
  • 1.13 Lab/tutorial
  • Chapter 2
  • Secret Key Encryption
  • 2.1 Introduction
  • 2.1.1 Early Days
  • 2.1.2 Encryption
  • 2.1.3 Secure Communications
  • 2.1.4 Modern Methods
  • 2.2 Key-based Cryptography
  • 2.2.1 Computation Difficulty
  • 2.2.2 Stream Encryption and Block Encryption
  • 2.2.3 Padding
  • 2.3 Brute-Force Analysis
  • 2.4 Adding Salt
  • 2.4.1 Cipher Block Chaining CBC
  • 2.4.2 Cipher Feedback (CFB)
  • 2.4.3 Output Feedback (OFB)
  • 2.4.4 Counter Mode
  • 2.4.5 CBC Example
  • 2.5 AES
  • 2.5.1 Substitution Bytes (S-box)
  • 2.5.2 Shift Row Transformation
  • 2.5.3 Mix Column Transformation.
  • 2.5.4 Add Round Key Transformation
  • 2.6 Secret-Key Encryption
  • 2.6.1 DES/3-DES
  • 2.6.2 RC4
  • 2.6.3 AES/Rijndael
  • 2.6.4 IDEA
  • 2.6.5 RC5
  • 2.6.6 Skipjack
  • 2.6.7 Blowfish
  • 2.6.8 Twofish
  • 2.6.9 Camellia
  • 2.6.10 XTEA
  • 2.7 Key Entropy
  • 2.8 OpenSSL
  • 2.9 Pohlog-Hellman
  • 2.10 Lab/tutorial
  • Chapter 3
  • Hashing
  • 3.1 Introduction
  • 3.2 Hashing Methods
  • 3.3 Problems with Hashes
  • 3.3.1 Hash Cracking
  • 3.4 Salting the Hash Value
  • 3.5 Common Hashing Methods
  • 3.5.1 LM Hashing
  • 3.5.2 APR1 (MD5 with Salt)
  • 3.5.3 SHA1, SHA256 and SHA512
  • 3.5.4 PHPass
  • 3.5.5 Non-Cryptographic Hashes
  • 3.6 Authenticating the Sender
  • 3.7 HMAC (Hash Message Authentication Code)
  • 3.8 Password Hashing
  • 3.9 Password Cracking
  • 3.10 One Time Passwords
  • 3.11 Time Stamp Protocol
  • 3.12 Winnowing and Chaffing
  • 3.13 SHA-3
  • 3.14 Lab/Tutorial
  • References
  • Chapter 4
  • Public Key
  • 4.1 Introduction
  • 4.2 RSA
  • 4.3 Elliptic Curve Ciphers (ECC)
  • 4.4 ElGamal
  • 4.5 Cramer-Shoup
  • 4.6 Paillier Cryptosystem
  • 4.7 Knapsack Encryption
  • 4.8 Identity-Based Encryption
  • 4.9 Lab/Tutorial
  • Reference
  • Chapter 5
  • Key Exchange
  • 5.1 Introduction
  • 5.2 Diffie-Hellman Key Exchange
  • 5.3 Creating the Generator
  • 5.4 Diffie-Hellman Examples
  • 5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA)
  • 5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE)
  • 5.7 Diffie-Hellman Weaknesses
  • 5.8 Using the Public Key to Pass a Secret Key
  • 5.9 Lab/Tutorial
  • Chapter 6
  • Authentication and Digital Certificates
  • 6.1 Introduction
  • 6.2 Methods of Authentication
  • 6.3 Digital Certificates and PKI
  • 6.3.1 PKI and Trust
  • 6.3.2 Digital Certificate Types
  • 6.3.3 Digital Certificate Reader
  • 6.4 Key and Certificate Management
  • 6.5 Creating a Signed Certificate
  • 6.6 Digital Certificate Passing
  • 6.7 Email Encryption
  • 6.8 Kerberos.
  • 6.9 Kerberos Key Sharing
  • 6.10 Lab/Tutorial
  • Chapter 7
  • Tunneling
  • 7.1 Introduction
  • 7.2 SSL/TLS Connections
  • 7.3 SSL/TLS Handshaking
  • 7.4 SSL Risks
  • 7.5 VPN Tunnels
  • 7.6 IKE
  • 7.6.1 Phase 1
  • 7.6.2 Phase 2
  • 7.7 Tor
  • 7.7.1 Tor Encryption
  • 7.7.2 Examining Tor Traffic
  • 7.8 Lab/Tutorial
  • References
  • Chapter 8
  • Crypto Cracking
  • 8.1 Introduction
  • 8.2 Key Escrow
  • 8.3 Cracking the Code
  • 8.4 RSA Cracking
  • 8.4.1 RSA Crack with Different e Value
  • 8.4.2 Cracking RSA by Factorizing N
  • 8.4.3 When Me Is less than N
  • 8.4.4 RSA Crack with Chinese Remainder Theory (CRT)
  • 8.4.5 Chosen Cipher Attack
  • 8.4.6 Blinding Attack
  • 8.4.7 Bleichenbacher's Attack
  • 8.5 AES Cracking
  • 8.5.1 AES Copy-and-Paste
  • 8.5.2 AES (Brute Force)
  • 8.5.3 AES Cracking with Non-Random Numbers
  • 8.6 Digital Certificate Cracking
  • 8.7 Lab/Tutorial
  • References
  • Chapter 9
  • Light-weight Cryptography and Other Methods
  • 9.1 Introduction
  • 9.2 Light-Weight Symmetric Methods
  • 9.3 Light-Weight Hashing
  • 9.4 Other Light Weight Ciphers
  • 9.5 Secret Shares
  • 9.6 Post Quantum Cryptography
  • 9.7 Lab/Tutorial
  • References
  • Chapter 10
  • Blockchain and Crypto-currency
  • 10.1 Introduction
  • 10.2 Bitcoins, Blockchain and Miners
  • 10.2.1 Bitcoin Transactions
  • 10.2.2 Mining Process
  • 10.3 Ethereum
  • 10.3.1 Gas
  • 10.3.2 Practical Implementation of Ethereum
  • 10.3.3 Smart Contracts
  • 10.4 Lab/Tutorial
  • References
  • Chapter 11
  • Zero-knowledge Proof (ZKP) and Privacy Preserving
  • 11.1 Introduction
  • 11.2 ZKP: Discrete Logs
  • 11.3 Commutative Encryption
  • 11.4 Graphs and Hamiltonian Cycles
  • 11.5 Feige-Fiat-Shamir
  • 11.6 Non-interactive Random Oracle Access for Zero-knowledge Proof
  • 11.7 A Fair Coin Flip
  • 11.8 ZKP: Paillier
  • 11.9 Oblivious Transfer (OT)
  • 11.10 Scrambled Circuits
  • 11.11 Millionaire's Problem.
  • 11.12 RAPPOR
  • 11.13 Secure Function Evaluation (SFE)
  • 11.14 Secure Remote Password (SRP) Protocol
  • 11.15 Lab/Tutorial
  • Reference
  • Chapter 12
  • Wireless Cryptography and Stream Ciphers
  • 12.1 Introduction
  • 12.2 RC4
  • 12.3 WEP
  • 12.4 Wi-fi Standards
  • 12.5 WPA and WPA-2
  • 12.6 WPA-2 Handshaking
  • 12.7 Cracking WPA-2 PSK
  • 12.8 Stream Ciphers
  • 12.9 A5 Ciphers
  • 12.9.1 Practical Systems
  • 12.9.2 A5/3
  • 12.10 Lab/Tutorial
  • References
  • Appendix A
  • Index
  • About the Author
  • Back Cover.