Cargando…

Everyday Cryptography : Fundamental Principles and Applications /

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Martin, Keith M.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Oxford : OUP Oxford, 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ia 4500
001 EBSCO_ocn784886692
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu---unuuu
008 120409s2012 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d OCLCQ  |d N$T  |d YDXCP  |d OCLCQ  |d IDEBK  |d OCLCQ  |d OCLCF  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d Z5A  |d LIP  |d OCLCA  |d AGLDB  |d OCLCQ  |d UEJ  |d JBG  |d D6H  |d OCLCQ  |d VTS  |d REC  |d TKN  |d STF  |d OCLCQ  |d UKAHL  |d OCLCO  |d OCLCQ 
019 |a 817083150 
020 |a 9780191625879  |q (electronic bk.) 
020 |a 0191625876  |q (electronic bk.) 
020 |a 1280594705 
020 |a 9781280594700 
029 1 |a DEBBG  |b BV043059622 
029 1 |a DEBSZ  |b 422916404 
029 1 |a DEBSZ  |b 423097202 
029 1 |a DEBSZ  |b 446491063 
029 1 |a DEBSZ  |b 493102051 
029 1 |a NLGGC  |b 341401072 
029 1 |a NZ1  |b 15122839 
035 |a (OCoLC)784886692  |z (OCoLC)817083150 
050 4 |a QA76.9.A25  |b M37 2012eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Martin, Keith M. 
245 1 0 |a Everyday Cryptography :  |b Fundamental Principles and Applications /  |c Keith M. Martin. 
260 |a Oxford :  |b OUP Oxford,  |c 2012. 
300 |a 1 online resource (553 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities. 
505 8 |a Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity. 
505 8 |a 6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary. 
505 8 |a 8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys. 
505 8 |a 11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks. 
500 |a Mathematics Appendix. 
520 |a Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science) 
650 6 |a Cryptographie. 
650 6 |a Chiffrement (Informatique) 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Cryptography.  |2 fast  |0 (OCoLC)fst00884552 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=438461  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24244196 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24082524 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL886560 
938 |a EBSCOhost  |b EBSC  |n 438461 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 362453 
938 |a YBP Library Services  |b YANK  |n 7583075 
938 |a YBP Library Services  |b YANK  |n 11260535 
994 |a 92  |b IZTAP