Everyday Cryptography: Fundamental Principles and Applications
Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Martin, Keith M. (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Oxford OUP Oxford 2012
Schlagworte:
Online-Zugang:FAW01
FAW02
Volltext
Beschreibung:Mathematics Appendix
Cover; Contents; List of Figures; List of Tables; Part I: Setting the Scene; 1. Basic Principles; 1.1 Why information security?; 1.2 Security risks; 1.3 Security services; 1.4 Fundamentals of cryptosystems; 1.5 Cryptosystem security assumptions; 1.6 Breaking cryptosystems; 1.7 Summary; 1.8 Further reading; 1.9 Activities; 2. Historical Cryptosystems; 2.1 Monoalphabetic ciphers; 2.2 Historical advances; 2.3 Summary; 2.4 Further reading; 2.5 Activities; 3. Theoretical versus Practical Security; 3.1 Theoretical security; 3.2 Practical security; 3.3 Summary; 3.4 Further reading; 3.5 Activities
Part II: The Cryptographic Toolkit4. Symmetric Encryption; 4.1 Classification of symmetric encryption algorithms; 4.2 Stream ciphers; 4.3 Block ciphers; 4.4 The Data Encryption Standard; 4.5 The Advanced Encryption Standard; 4.6 Modes of operation; 4.7 Summary; 4.8 Further reading; 4.9 Activities; 5. Public-Key Encryption; 5.1 Public-key cryptography; 5.2 RSA; 5.3 ElGamal and elliptic curve variants; 5.4 Comparison of RSA, ElGamal and elliptic curve variants; 5.5 Uses in practice of public-key cryptosystems; 5.6 Summary; 5.7 Further reading; 5.8 Activities; 6. Data Integrity
6.1 Different levels of data integrity6.2 Hash functions; 6.3 Message authentication codes; 6.4 Summary; 6.5 Further reading; 6.6 Activities; 7. Digital Signature Schemes; 7.1 Digital signatures; 7.2 Non-repudiation using symmetric techniques; 7.3 Digital signature schemes based on RSA; 7.4 Digital signature schemes in practice; 7.5 Summary; 7.6 Further reading; 7.7 Activities; 8. Entity Authentication; 8.1 Random number generation; 8.2 Providing freshness; 8.3 Fundamentals of entity authentication; 8.4 Passwords; 8.5 Dynamic password schemes; 8.6 Zero-knowledge mechanisms; 8.7 Summary
8.8 Further reading8.9 Activities; 9. Cryptographic Protocols; 9.1 Protocol basics; 9.2 From objectives to a protocol; 9.3 Analysing a simple protocol; 9.4 Authentication and key establishment protocols; 9.5 Summary; 9.6 Further reading; 9.7 Activities; Part III: Key Management; 10. Key Management; 10.1 Key management fundamentals; 10.2 Key lengths and lifetimes; 10.3 Key generation; 10.4 Key establishment; 10.5 Key storage; 10.6 Key usage; 10.7 Governing key management; 10.8 Summary; 10.9 Further reading; 10.10 Activities; 11. Public-Key Management; 11.1 Certification of public keys
11.2 The certificate lifecycle11.3 Public-key management models; 11.4 Alternative approaches; 11.5 Summary; 11.6 Further reading; 11.7 Activities; Part IV: Applications; 12. Cryptographic Applications; 12.1 Cryptography on the Internet; 12.2 Cryptography for wireless local area networks; 12.3 Cryptography for mobile telecommunications; 12.4 Cryptography for secure payment card transactions; 12.5 Cryptography for video broadcasting; 12.6 Cryptography for identity cards; 12.7 Cryptography for home users; 12.8 Summary; 12.9 Further reading; 12.10 Activities; 13. Closing Remarks
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient currenttechnologies and over-whelming theoretical research. Everyday Cryptography is a self-contained and widely accessible in
Beschreibung:1 Online-Ressource (553 pages)
ISBN:0191625876
1280594705
9780191625879
9781280594700

Es ist kein Print-Exemplar vorhanden.

Fernleihe Bestellen Achtung: Nicht im THWS-Bestand! Volltext öffnen