Everyday Cryptography: Fundamental Principles and Applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Oxford
OUP Oxford
2012
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | Mathematics Appendix Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity 6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary 8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys 11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in |
Beschreibung: | 1 Online-Ressource (553 pages) |
ISBN: | 0191625876 1280594705 9780191625879 9781280594700 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043059622 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2012 |||| o||u| ||||||eng d | ||
020 | |a 0191625876 |c electronic bk. |9 0-19-162587-6 | ||
020 | |a 1280594705 |9 1-280-59470-5 | ||
020 | |a 9780191625879 |c electronic bk. |9 978-0-19-162587-9 | ||
020 | |a 9781280594700 |9 978-1-280-59470-0 | ||
035 | |a (OCoLC)784886692 | ||
035 | |a (DE-599)BVBBV043059622 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Martin, Keith M. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Everyday Cryptography |b Fundamental Principles and Applications |c Keith M. Martin |
264 | 1 | |a Oxford |b OUP Oxford |c 2012 | |
300 | |a 1 Online-Ressource (553 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Mathematics Appendix | ||
500 | |a Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities | ||
500 | |a Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity | ||
500 | |a 6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary | ||
500 | |a 8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys | ||
500 | |a 11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks | ||
500 | |a Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in | ||
650 | 4 | |a Computer science | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Cryptography |2 fast | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
650 | 4 | |a Informatik | |
650 | 4 | |a Cryptography | |
650 | 4 | |a Data encryption (Computer science) | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028483814 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175433508323328 |
---|---|
any_adam_object | |
author | Martin, Keith M. |
author_facet | Martin, Keith M. |
author_role | aut |
author_sort | Martin, Keith M. |
author_variant | k m m km kmm |
building | Verbundindex |
bvnumber | BV043059622 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)784886692 (DE-599)BVBBV043059622 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05736nmm a2200589zc 4500</leader><controlfield tag="001">BV043059622</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2012 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0191625876</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-19-162587-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1280594705</subfield><subfield code="9">1-280-59470-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780191625879</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-19-162587-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781280594700</subfield><subfield code="9">978-1-280-59470-0</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)784886692</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043059622</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Martin, Keith M.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Everyday Cryptography</subfield><subfield code="b">Fundamental Principles and Applications</subfield><subfield code="c">Keith M. Martin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">OUP Oxford</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (553 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Mathematics Appendix</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cryptography</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Informatik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028483814</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043059622 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:16:13Z |
institution | BVB |
isbn | 0191625876 1280594705 9780191625879 9781280594700 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028483814 |
oclc_num | 784886692 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (553 pages) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | OUP Oxford |
record_format | marc |
spelling | Martin, Keith M. Verfasser aut Everyday Cryptography Fundamental Principles and Applications Keith M. Martin Oxford OUP Oxford 2012 1 Online-Ressource (553 pages) txt rdacontent c rdamedia cr rdacarrier Mathematics Appendix Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity 6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary 8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys 11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in Computer science COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cryptography fast Data encryption (Computer science) fast Informatik Cryptography Data encryption (Computer science) Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s 1\p DE-604 http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461 Aggregator Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Martin, Keith M. Everyday Cryptography Fundamental Principles and Applications Computer science COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cryptography fast Data encryption (Computer science) fast Informatik Cryptography Data encryption (Computer science) Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Everyday Cryptography Fundamental Principles and Applications |
title_auth | Everyday Cryptography Fundamental Principles and Applications |
title_exact_search | Everyday Cryptography Fundamental Principles and Applications |
title_full | Everyday Cryptography Fundamental Principles and Applications Keith M. Martin |
title_fullStr | Everyday Cryptography Fundamental Principles and Applications Keith M. Martin |
title_full_unstemmed | Everyday Cryptography Fundamental Principles and Applications Keith M. Martin |
title_short | Everyday Cryptography |
title_sort | everyday cryptography fundamental principles and applications |
title_sub | Fundamental Principles and Applications |
topic | Computer science COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Cryptography fast Data encryption (Computer science) fast Informatik Cryptography Data encryption (Computer science) Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer science COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Cryptography Data encryption (Computer science) Informatik Kryptologie |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=438461 |
work_keys_str_mv | AT martinkeithm everydaycryptographyfundamentalprinciplesandapplications |