Everyday Cryptography : Fundamental Principles and Applications /
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Oxford :
OUP Oxford,
2012.
|
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities.
- Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity.
- 6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary.
- 8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys.
- 11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks.