Everyday cryptography: fundamental principles and applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford [u.a.]
Oxford Univ. Press
2012
|
Ausgabe: | 1. publ. |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XXI, 530 S. Ill., graph. Darst. 24 cm |
ISBN: | 9780199695591 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV039871545 | ||
003 | DE-604 | ||
005 | 20131212 | ||
007 | t | ||
008 | 120207s2012 ad|| |||| 00||| eng d | ||
015 | |a GBB1C8198 |2 dnb | ||
020 | |a 9780199695591 |c paperback |9 978-0-19-969559-1 | ||
035 | |a (OCoLC)760290421 | ||
035 | |a (DE-599)BVBBV039871545 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-29T |a DE-824 |a DE-12 | ||
082 | 0 | |a 652.8 |2 23 | |
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a 24,1 |2 ssgn | ||
100 | 1 | |a Martin, Keith M. |e Verfasser |0 (DE-588)1020725265 |4 aut | |
245 | 1 | 0 | |a Everyday cryptography |b fundamental principles and applications |c by Keith M. Martin |
250 | |a 1. publ. | ||
264 | 1 | |a Oxford [u.a.] |b Oxford Univ. Press |c 2012 | |
300 | |a XXI, 530 S. |b Ill., graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m HBZ Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024730855&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-024730855 | ||
942 | 1 | 1 | |c 004 |e 22/bsb |
942 | 1 | 1 | |c 302.2 |e 22/bsb |
Datensatz im Suchindex
_version_ | 1804148813148979200 |
---|---|
adam_text | Titel: Everyday cryptography
Autor: Martin, Keith M
Jahr: 2012
Contents
List of Figures xix
List of Tables xxii
Parti
Setting the Scene 1
1. Basic Principles 2
1.1 Why information security? 2
1.2 Security risks 7
1.3 Security services 11
1.4 Fundamentals of cryptosystems 14
1.5 Cryptosystem security assumptions 24
1.6 Breaking cryptosystems 30
1.7 Summary 40
1.8 Further reading 40
1.9 Activities 42
2. Historical Cryptosystems 47
2.1 Monoalphabetic ciphers 48
2.2 Historical advances 58
2.3 Summary 70
2.4 Further reading 70
2.5 Activities 71
3. Theoretical versus Practical Security 76
3.1 Theoretical security 76
3.2 Practical security 87
3.3 Summary 101
3.4 Further reading 101
3.5 Activities 102
CONTENTS
Partii
The Cryptographic Toolkit 105
A. Symmetric Encryption 106
4.1 Classification of symmetric encryption algorithms 106
4.2 Stream ciphers 1°8
4.3 Block ciphers 114
4.4 The Data Encryption Standard 117
4.5 The Advanced Encryption Standard 125
4.6 Modes of operation 129
4.7 Summary 145
4.8 Further reading 145
4.9 Activities 146
5. Public-Key Encryption 150
5.1 Public-key cryptography 151
5.2 RSA I61
5.3 ElGamal and elliptic curve variants 167
5.4 Comparison of RSA, ElGamal and elliptic curve variants 173
5.5 Uses in practice of public-key cryptosystems 178
5.6 Summary 181
5.7 Further reading 181
5.8 Activities I82
6. Data Integrity 186
6.1 Different levels of data integrity 186
6.2 Hash functions I88
6.3 Message authentication codes 205
6.4 Summary 217
6.5 Further reading 218
6.6 Activities 218
7. Digital Signature Schemes 223
7.1 Digital signatures 223
7.2 Non-repudiation using symmetric techniques 227
7.3 Digital signature schemes based on RSA 230
7.4 Digital signature schemes in practice 241
7.5 Summary 249
7.6 Further reading 249
7.7 Activities 250
xvi
CONTENTS
8. Entity Authentication 253
8.1 Random number generation 253
8.2 Providing freshness 259
8.3 Fundamentals of entity authentication 265
8.4 Passwords 270
8.5 Dynamic password schemes 273
8.6 Zero-knowledge mechanisms 277
8.7 Summary 280
8.8 Further reading 280
8.9 Activities 281
9. Cryptographic Protocols 286
9.1 Protocol basics 286
9.2 From objectives to a protocol 289
9.3 Analysing a simple protocol 293
9.4 Authentication and key establishment protocols 309
9.5 Summary 321
9.6 Further reading 322
9.7 Activities 322
Part III
Key Management 325
10. Key Management 326
10.1 Key management fundamentals 327
10.2 Key lengths and lifetimes 332
10.3 Key generation 335
10.4 Key establishment 339
10.5 Key storage 350
10.6 Key usage 359
10.7 Governing key management 367
10.8 Summary 370
10.9 Further reading 370
10.10 Activities 371
11. Public-Key Management 376
11.1 Certification of public keys 377
11.2 The certificate lifecycle 382
11.3 Public-key management models 390
11.4 Alternative approaches 397
xvn
CONTENTS
11.5 Summary 403
11.6 Further reading 404
11.7 Activities 405
Part IV
Applications 409
12. Cryptographic Applications 410
12.1 Cryptography on the Internet 411
12.2 Cryptography for wireless local area networks 422
12.3 Cryptography for mobile telecommunications 434
12.4 Cryptography for secure payment card transactions 444
12.5 Cryptography for video broadcasting 455
12.6 Cryptography for identity cards 463
12.7 Cryptography for home users 474
12.8 Summary 481
12.9 Further reading 482
12.10 Activities 483
13. Closing Remarks 488
Mathematics Appendix 490
A.l Decimal, binary and hex 490
A.2 Modular arithmetic 498
A3 The mathematics of RS A 503
A.4 The mathematics of ElGamal 509
A.5 Further reading 511
Bibliography 512
Index 521
xviu
|
any_adam_object | 1 |
author | Martin, Keith M. |
author_GND | (DE-588)1020725265 |
author_facet | Martin, Keith M. |
author_role | aut |
author_sort | Martin, Keith M. |
author_variant | k m m km kmm |
building | Verbundindex |
bvnumber | BV039871545 |
classification_rvk | SK 170 |
ctrlnum | (OCoLC)760290421 (DE-599)BVBBV039871545 |
dewey-full | 652.8 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 652 - Processes of written communication |
dewey-raw | 652.8 |
dewey-search | 652.8 |
dewey-sort | 3652.8 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Mathematik Wirtschaftswissenschaften |
edition | 1. publ. |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01486nam a2200409 c 4500</leader><controlfield tag="001">BV039871545</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20131212 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">120207s2012 ad|| |||| 00||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB1C8198</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780199695591</subfield><subfield code="c">paperback</subfield><subfield code="9">978-0-19-969559-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)760290421</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV039871545</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield><subfield code="a">DE-824</subfield><subfield code="a">DE-12</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">652.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">24,1</subfield><subfield code="2">ssgn</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Martin, Keith M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1020725265</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Everyday cryptography</subfield><subfield code="b">fundamental principles and applications</subfield><subfield code="c">by Keith M. Martin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1. publ.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford [u.a.]</subfield><subfield code="b">Oxford Univ. Press</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXI, 530 S.</subfield><subfield code="b">Ill., graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">HBZ Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024730855&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024730855</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">004</subfield><subfield code="e">22/bsb</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">302.2</subfield><subfield code="e">22/bsb</subfield></datafield></record></collection> |
id | DE-604.BV039871545 |
illustrated | Illustrated |
indexdate | 2024-07-10T00:13:06Z |
institution | BVB |
isbn | 9780199695591 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024730855 |
oclc_num | 760290421 |
open_access_boolean | |
owner | DE-29T DE-824 DE-12 |
owner_facet | DE-29T DE-824 DE-12 |
physical | XXI, 530 S. Ill., graph. Darst. 24 cm |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Oxford Univ. Press |
record_format | marc |
spelling | Martin, Keith M. Verfasser (DE-588)1020725265 aut Everyday cryptography fundamental principles and applications by Keith M. Martin 1. publ. Oxford [u.a.] Oxford Univ. Press 2012 XXI, 530 S. Ill., graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Cryptography Data encryption (Computer science) Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 HBZ Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024730855&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Martin, Keith M. Everyday cryptography fundamental principles and applications Cryptography Data encryption (Computer science) Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Everyday cryptography fundamental principles and applications |
title_auth | Everyday cryptography fundamental principles and applications |
title_exact_search | Everyday cryptography fundamental principles and applications |
title_full | Everyday cryptography fundamental principles and applications by Keith M. Martin |
title_fullStr | Everyday cryptography fundamental principles and applications by Keith M. Martin |
title_full_unstemmed | Everyday cryptography fundamental principles and applications by Keith M. Martin |
title_short | Everyday cryptography |
title_sort | everyday cryptography fundamental principles and applications |
title_sub | fundamental principles and applications |
topic | Cryptography Data encryption (Computer science) Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Cryptography Data encryption (Computer science) Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024730855&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT martinkeithm everydaycryptographyfundamentalprinciplesandapplications |