Cryptography engineering: design principles and practical applications
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Indianapolis, IN
Wiley
[2010]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xxix, 353 Seiten Diagramme |
ISBN: | 0470474246 9780470474242 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV036109134 | ||
003 | DE-604 | ||
005 | 20190911 | ||
007 | t | ||
008 | 100407s2010 |||| |||| 00||| eng d | ||
020 | |a 0470474246 |c (pbk.) £45.00 |9 0-470-47424-6 | ||
020 | |a 9780470474242 |c (pbk.) £45.00 |9 978-0-470-47424-2 | ||
035 | |a (OCoLC)436030574 | ||
035 | |a (DE-599)GBV616428057 | ||
040 | |a DE-604 |b ger | ||
041 | 0 | |a eng | |
049 | |a DE-83 |a DE-355 |a DE-11 |a DE-29T |a DE-384 |a DE-Aug4 |a DE-473 |a DE-739 |a DE-91G | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8/2 |2 22 | |
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
100 | 1 | |a Ferguson, Niels |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cryptography engineering |b design principles and practical applications |c Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
264 | 1 | |a Indianapolis, IN |b Wiley |c [2010] | |
300 | |a xxix, 353 Seiten |b Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Cryptography | |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Schneier, Bruce |d 1963- |e Verfasser |0 (DE-588)123003180 |4 aut | |
700 | 1 | |a Kohno, Tadayoshi |e Verfasser |4 aut | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018999348&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-018999348 |
Datensatz im Suchindex
_version_ | 1804141183590465536 |
---|---|
adam_text | Titel: Cryptography engineering
Autor: Ferguson, Niels
Jahr: 2010
Contents
Preface to Cryptography Engineering
History
Example Syllabi
Additional Information
Preface to Practical Cryptography (the 1 st Edition)
How to Read this Book
Parti Introduction
Chapter 1 The Context of Cryptography
1.1 The Role of Cryptography
1.2 The Weakest Link Property
1.3 The Adversarial Setting
1.4 Professional Paranoia
1.4.1 Broader Benefits
1.4.2 Discussing Attacks
1.5 Threat Model
1.6 Cryptography Is Not the Solution
1.7 Cryptography Is Very Difficult
1.8 Cryptography Is the Easy Part
1.9 Generic Attacks
1.10 Security and Other Design Criteria
1.10.1 Security Versus Performance
1.10.2 Security Versus Features
1.10.3 Security Versus Evolving Systems
XXIII
xxiv
xxiv
xxvi
xxvii
xxix
1
3
4
5
7
8
9
9
10
12
13
13
14
14
14
17
17
xiii
xiv Contents
l.ll Further Reading
1.12 Exercises for Professional Paranoia
1.12.1 Current Event Exercises
1.12.2 Security Review Exercises
1.13 General Exercises
Chapter 2 Introduction to Cryptography
2.1 Encryption
2.1.1 Kerckhoffs Principle
2.2 Authentication
2.3 Public-Key Encryption
2.4 Digital Signatures
2.5 PKI
2.6 Attacks
2.6.1 The Ciphertext-Only Model
2.6.2 The Known-Plaintext Model
2.6.3 The Chosen-Plaintext Model
2.6.4 The Chosen-Ciphertext Model
2.6.5 The Distinguishing Attack Goal
2.6.6 Other Types of Attack
2.7 Under the Hood
2.7.1 Birthday Attacks
2.7.2 Meet-in-the-Middle Attacks
2.8 Security Level
2.9 Performance
2.10 Complexity
2.11 Exercises
18
18
19
20
21
23
23
24
25
27
29
29
31
31
31
32
32
32
33
33
33
34
36
37
37
38
Part II Message Security 41
Chapter 3 Block Ciphers 43
3.1 What Is a Block Cipher? 43
3.2 Types of Attack 44
3.3 The Ideal Block Cipher 46
3.4 Definition of Block Cipher Security 46
3.4.1 Parity of a Permutation 49
3.5 Real Block Ciphers 50
3.5.1 DES 51
3.5.2 AES 54
3.5.3 Serpent 56
Contents xv
3.5.4 Twofish 57
3.5.5 Other AES Finalists 58
3.5.6 Which Block Cipher Should I Choose? 59
3.5.7 What Key Size Should I Use? 60
3.6 Exercises 61
Chapter 4 Block Cipher Modes 63
4.1 Padding 64
4.2 ECB 65
4.3 CBC 65
4.3.1 Fixed IV 66
4.3.2 Counter IV 66
4.3.3 Random IV 66
4.3.4 Nonce-Generated IV 67
4.4 OFB 68
4.5 CTR 70
4.6 Combined Encryption and Authentication 71
4.7 Which Mode Should I Use? 71
4.8 Information Leakage 72
4.8.1 Chances of a Collision 73
4.8.2 How to Deal With Leakage 74
4.8.3 About Our Math 75
4.9 Exercises 75
Chapter 5 Hash i Functions 77
5.1 Security of Hash Functions 78
5.2 Real Hash Functions 79
5.2.1 A Simple But Insecure Hash Function 80
5.2.2 MD5 81
5.2.3 SHA-1 82
5.2.4 SHA-224, SHA-256, SHA-384, and SHA-512 82
5.3 Weaknesses of Hash Functions 83
5.3.1 Length Extensions 83
5.3.2 Partial-Message Collision 84
5.4 Fixing the Weaknesses 84
5.4.1 Toward a Short-term Fix 85
5.4.2 A More Efficient Short-term Fix 85
5.4.3 Another Fix 87
5.5 Which Hash Function Should I Choose? 87
5.6 Exercises 87
xvi Contents
Chapter 6 Message Authentication Codes
6.1 What a MAC Does
6.2 The Ideal MAC and MAC Security
6.3 CBC-MAC and CMAC
6.4 HMAC
6.5 GMAC
6.6 Which MAC to Choose?
6.7 Using a MAC
6.8 Exercises
Chapter 7 The Secure Channel
7.1 Properties of a Secure Channel
7.1.1 Roles
7.1.2 Key
7.1.3 Messages or Stream
7.1.4 Security Properties
7.2 Order of Authentication and Encryption
7.3 Designing a Secure Channel: Overview
7.3.1 Message Numbers
7.3.2 Authentication
7.3.3 Encryption
7.3.4 Frame Format
7.4 Design Details
7.4.1 Initialization
7.4.2 Sending a Message
7.4.3 Receiving a Message
7.4.4 Message Order
7.5 Alternatives
7.6 Exercises
Chapter 8 Implementation Issues (I)
8.1 Creating Correct Programs
8.1.1 Specifications
8.1.2 Test and Fix
8.1.3 Lax Attitude
8.1.4 So How Do We Proceed?
8.2 Creating Secure Software
8.3 Keeping Secrets
8.3.1 Wiping State
8.3.2 Swap File
89
89
90
91
93
94
95
95
97
99
99
99
100
100
101
102
104
105
106
106
107
107
107
108
109
111
112
113
115
116
117
118
119
119
120
120
121
122
Contents xvn
8.3.3 Caches 124
8.3.4 Data Retention by Memory 125
8.3.5 Access by Others 127
8.3.6 Data Integrity 127
8.3.7 What to Do 128
8.4 Quality of Code 128
8.4.1 Simplicity 129
8.4.2 Modularization 129
8.4.3 Assertions 130
8.4.4 Buffer Overflows 131
8.4.5 Testing 131
8.5 Side-Channel Attacks 132
8.6 Beyond this Chapter 133
8.7 Exercises 133
Part III Key Negotiation 135
Chapter 9 Generating Randomness 137
9.1 Real Random 138
9.1.1 Problems With Using Real Random Data 139
9.1.2 Pseudorandom Data 140
9.1.3 Real Random Data and prngs 140
9.2 Attack Models for a prng 141
9.3 Fortuna 142
9.4 The Generator 143
9.4.1 Initialization 145
9.4.2 Reseed 145
9.4.3 Generate Blocks 146
9.4.4 Generate Random Data 146
9.4.5 Generator Speed 147
9.5 Accumulator 147
9.5.1 Entropy Sources 147
9.5.2 Pools 148
9.5.3 Implementation Considerations 150
9.5.3.1 Distribution of Events Over Pools 150
9.5.3.2 Running Time of Event Passing 151
9.5.4 Initialization 152
9.5.5 Getting Random Data 153
9.5.6 Add an Event 154
9.6 Seed File Management 155
9.6.1 Write Seed File 156
xviii Contents
9.6.2 Update Seed File
9.6.3 When to Read and Write the Seed File
9.6.4 Backups and Virtual Machines
9.6.5 Atomicity of File System Updates
9.6.6 First Boot
9.7 Choosing Random Elements
9.8 Exercises
156
157
157
158
158
159
161
Chapter 10 Primes 163
10.1 Divisibility and Primes 163
10.2 Generating Small Primes 166
10.3 Computations Modulo a Prime 167
10.3.1 Addition and Subtraction 168
10.3.2 Multiplication 169
10.3.3 Groups and Finite Fields 169
10.3.4 The GCD Algorithm 170
10.3.5 The Extended Euclidean Algorithm 171
10.3.6 Working Modulo 2 172
10.4 Large Primes 173
10.4.1 Primality Testing 176
10.4.2 Evaluating Powers 178
10.5 Exercises 179
181
182
183
184
185
186
187
188
190
191
193
195
195
196
196
197
198
199
199
Chapter 11 Diffie-Hellman
11.1 Groups
11.2 Basic DH
11.3 Man in the Middle
11.4 Pitfalls
11.5 Safe Primes
11.6 Using a Smaller Subgroup
11.7 The Size of p
11.8 Practical Rules
11.9 What Can Go Wrong?
11.10 Exercises
Chapter 12 RSA
12.1 Introduction
12.2 The Chinese Remainder Theorem
12.2.1 Garner s Formula
12.2.2 Generalizations
12.2.3 Uses
12.2.4 Conclusion
12.3 Multiplication Modulo n
Contents xix
12.4 RSA Defined 200
12.4.1 Digital Signatures with RSA 200
12.4.2 Public Exponents 201
12.4.3 The Private Key 202
12.4.4 The Size of n 203
12.4.5 Generating RSA Keys 203
12.5 Pitfalls Using RSA 205
12.6 Encryption 206
12.7 Signatures 209
12.8 Exercises 211
Chapter 13 Introduction to Cryptographic Protocols 213
13.1 Roles 213
13.2 Trust 214
13.2.1 Risk 215
13.3 Incentive 215
13.4 Trust in Cryptographic Protocols 217
13.5 Messages and Steps 218
13.5.1 The Transport Layer 219
13.5.2 Protocol and Message Identity 219
13.5.3 Message Encoding and Parsing 220
13.5.4 Protocol Execution States 221
13.5.5 Errors 221
13.5.6 Replay and Retries 223
13.6 Exercises 225
Chapter 14 Key Negotiation 227
14.1 The Setting 227
14.2 A First Try 228
14.3 Protocols Live Forever 229
14.4 An Authentication Convention 230
14.5 A Second Attempt 231
14.6 A Third Attempt 232
14.7 The Final Protocol 233
14.8 Different Views of the Protocol 235
14.8.1 Alice s View 235
14.8.2 Bob s View 236
24.8.3 Attacker s View 236
14.8.4 Key Compromise 238
14.9 Computational Complexity of the Protocol 238
14.9.1 Optimization Tricks 239
14.10 Protocol Complexity 240
xx Contents
14.11 A Gentle Warning 241
14.12 Key Negotiation from a Password 241
14.13 Exercises 241
Chapter 15 Implementation Issues (II) 243
15.1 Large Integer Arithmetic 243
15.1.1 Wooping 245
15.1.2 Checking DH Computations 248
15.1.3 Checking RSA Encryption 248
15.1.4 Checking RSA Signatures 249
15.1.5 Conclusion 249
15.2 Faster Multiplication 249
15.3 Side-Channel Attacks 250
15.3.1 Countermeasures 251
15.4 Protocols 252
15.4.1 Protocols Over a Secure Channel 253
15.4.2 Receiving a Message 253
15.4.3 Timeouts 255
15.5 Exercises 255
Part IV Key Management 257
Chapter 16 The Clock 259
16.1 Uses for a Clock 259
16.1.1 Expiration 259
16.1.2 Unique Value 260
16.1.3 Monotonicity 260
16.1.4 Real-Time Transactions 260
16.2 Using the Real-Time Clock Chip 261
16.3 Security Dangers 262
16.3.1 Setting the Clock Back 262
16.3.2 Stopping the Clock 262
16.3.3 Setting the Clock Forward 263
16.4 Creating a Reliable Clock 264
16.5 The Same-State Problem 265
16.6 Time 266
16.7 Closing Recommendations 267
16.8 Exercises 267
Chapter 17 Key Servers 269
17.1 Basics 270
17.2 Kerberos 270
Contents xxi
271
272
272
272
273
273
274
275
275
276
276
276
276
277
277
277
277
278
279
280
280
Chapter 19 PKI Reality 281
19.1 Names 281
19.2 Authority 283
19.3 Trust 284
19.4 Indirect Authorization 285
19.5 Direct Authorization 286
19.6 Credential Systems 286
19.7 The Modified Dream 288
19.8 Revocation 289
19.8.1 Revocation List 289
19.8.2 Fast Expiration 290
19.8.3 Online Certificate Verification 291
19.8.4 Revocation Is Required 291
19.9 So What Is a PKI Good For? 292
19.10 What to Choose 293
19.11 Exercises 294
17.3 Simpler Solutions
17.3.1 Secure Connection
17.3.2 Setting Up a Key
17.3.3 Rekeying
17.3.4 Other Properties
17.4 What to Choose
17.5 Exercises
Chapter 18 The Dream of PKI
18.1 A Very Short PKI Overview
18.2 PKI Examples
18.2.1 The Universal PKI
18.2.2 VPN Access
18.2.3 Electronic Banking
18.2.4 Refinery Sensors
18.2.5 Credit Card Organization
18.3 Additional Details
18.3.1 Multilevel Certificates
18.3.2 Expiration
18.3.3 Separate Registration Authority
18.4 Summary
18.5 Exercises
xxii Contents
Chapter 20 PKI Practicalities 295
20.1 Certificate Format 295
20.1.1 Permission Language 295
20.1.2 The Root Key 296
20.2 The Life of a Key 297
20.3 Why Keys Wear Out 298
20.4 Going Further 300
20.5 Exercises 300
Chapter 21 Storing Secrets 301
21.1 Disk 301
21.2 Human Memory 302
21.2.1 Salting and Stretching 304
21.3 Portable Storage 306
21.4 Secure Token 306
21.5 Secure UI 307
21.6 Biometrics 308
21.7 Single Sign-On 309
21.8 Risk of Loss 310
21.9 Secret Sharing 310
21.10 Wiping Secrets 311
21.10.1 Paper 311
21.10.2 Magnetic Storage 312
21.10.3 Solid-State Storage 313
21.11 Exercises 313
Part V Miscellaneous 315
Chapter 22 Standards and Patents 317
22.1 Standards 317
22.1.1 The Standards Process 317
22.1.1.1 The Standard 319
22.1.1.2 Functionality 319
22.1.1.3 Security 320
22.1.2 SSL 320
22.1.3 AES: Standardization by Competition 321
22.2 Patents 322
Chapter 23 Involving Experts 323
Bibliography 327
Index 339
|
any_adam_object | 1 |
author | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi |
author_GND | (DE-588)123003180 |
author_facet | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi |
author_role | aut aut aut |
author_sort | Ferguson, Niels |
author_variant | n f nf b s bs t k tk |
building | Verbundindex |
bvnumber | BV036109134 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)436030574 (DE-599)GBV616428057 |
dewey-full | 005.8/2 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/2 |
dewey-search | 005.8/2 |
dewey-sort | 15.8 12 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01735nam a2200433 c 4500</leader><controlfield tag="001">BV036109134</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190911 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">100407s2010 |||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0470474246</subfield><subfield code="c">(pbk.) £45.00</subfield><subfield code="9">0-470-47424-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780470474242</subfield><subfield code="c">(pbk.) £45.00</subfield><subfield code="9">978-0-470-47424-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)436030574</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV616428057</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-83</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8/2</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ferguson, Niels</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography engineering</subfield><subfield code="b">design principles and practical applications</subfield><subfield code="c">Niels Ferguson, Bruce Schneier, Tadayoshi Kohno</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Indianapolis, IN</subfield><subfield code="b">Wiley</subfield><subfield code="c">[2010]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxix, 353 Seiten</subfield><subfield code="b">Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schneier, Bruce</subfield><subfield code="d">1963-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)123003180</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kohno, Tadayoshi</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018999348&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-018999348</subfield></datafield></record></collection> |
id | DE-604.BV036109134 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T22:11:49Z |
institution | BVB |
isbn | 0470474246 9780470474242 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-018999348 |
oclc_num | 436030574 |
open_access_boolean | |
owner | DE-83 DE-355 DE-BY-UBR DE-11 DE-29T DE-384 DE-Aug4 DE-473 DE-BY-UBG DE-739 DE-91G DE-BY-TUM |
owner_facet | DE-83 DE-355 DE-BY-UBR DE-11 DE-29T DE-384 DE-Aug4 DE-473 DE-BY-UBG DE-739 DE-91G DE-BY-TUM |
physical | xxix, 353 Seiten Diagramme |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Wiley |
record_format | marc |
spelling | Ferguson, Niels Verfasser aut Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno Indianapolis, IN Wiley [2010] xxix, 353 Seiten Diagramme txt rdacontent n rdamedia nc rdacarrier Computer security Cryptography Computersicherheit (DE-588)4274324-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s Computersicherheit (DE-588)4274324-2 s DE-604 Schneier, Bruce 1963- Verfasser (DE-588)123003180 aut Kohno, Tadayoshi Verfasser aut HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018999348&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Ferguson, Niels Schneier, Bruce 1963- Kohno, Tadayoshi Cryptography engineering design principles and practical applications Computer security Cryptography Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4033329-2 |
title | Cryptography engineering design principles and practical applications |
title_auth | Cryptography engineering design principles and practical applications |
title_exact_search | Cryptography engineering design principles and practical applications |
title_full | Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
title_fullStr | Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
title_full_unstemmed | Cryptography engineering design principles and practical applications Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
title_short | Cryptography engineering |
title_sort | cryptography engineering design principles and practical applications |
title_sub | design principles and practical applications |
topic | Computer security Cryptography Computersicherheit (DE-588)4274324-2 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Cryptography Computersicherheit Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=018999348&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT fergusonniels cryptographyengineeringdesignprinciplesandpracticalapplications AT schneierbruce cryptographyengineeringdesignprinciplesandpracticalapplications AT kohnotadayoshi cryptographyengineeringdesignprinciplesandpracticalapplications |