Everyday cryptography: fundamental principles and applications
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Oxford
Oxford University Press
2017
|
Ausgabe: | Second edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturverzeichnis Seite [655]-666 Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | xxx, 674 Seiten Illustrationen |
ISBN: | 9780198788010 9780198788003 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044365200 | ||
003 | DE-604 | ||
005 | 20220428 | ||
007 | t | ||
008 | 170622s2017 a||| |||| 00||| eng d | ||
020 | |a 9780198788010 |c Pb.: £ 34.99 |9 978-0-19-878801-0 | ||
020 | |a 9780198788003 |c Hb.: £ 85.40 |9 978-0-19-878800-3 | ||
035 | |a (OCoLC)1002242075 | ||
035 | |a (DE-599)BVBBV044365200 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-703 |a DE-739 |a DE-20 |a DE-83 | ||
084 | |a SK 170 |0 (DE-625)143221: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Martin, Keith M. |e Verfasser |0 (DE-588)1020725265 |4 aut | |
245 | 1 | 0 | |a Everyday cryptography |b fundamental principles and applications |c Keith M. Martin |
250 | |a Second edition | ||
264 | 1 | |a Oxford |b Oxford University Press |c 2017 | |
300 | |a xxx, 674 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Literaturverzeichnis Seite [655]-666 | ||
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029767736&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-029767736 |
Datensatz im Suchindex
_version_ | 1804177616163307520 |
---|---|
adam_text | Contents
Preface to the Second Edition V
Preface vii
List of Figures xxviii
List of Tables xxxi
I Setting the Scene 1
1. Basic Principles.................................. ........ 3
1.1 Why information security? 3
1.1.1 The rising profile of information security 4
1.1.2 Two very different office environments 4
1.1.3 Differing perspectives 6
1.1.4 The importance of security infrastructure 8
1.2 Security risks 9
1.2.1 Types of attack 9
1.2.2 Security risks for a simple scenario 10
1.2.3 Choosing security mechanisms 11
1.3 Security services 12
1.3.1 Basic definitions 12
1.3.2 Relationships between security services 14
1.4 Fundamentals of cryptosystems 16
1.4.1 Different cryptographic concepts 16
1.4.2 Cryptographic primitives for security services 17
1.4.3 Basic model of a cryptosystem 19
1.4.4 Codes 22
1.4.5 Steganography 23
1.4.6 Access control 23
1.4.7 Two types of cryptosystem 24
1.4.8 Secrecy of the encryption key 25
1.5 Cryptosystem security assumptions 27
1.5.1 Standard assumptions 27
1.5.2 Theoretical attack models 28
1.5.3 Knowledge of the encryption algorithm 29
1.5.4 Use of publicly known algorithms 3i
1.6 Breaking cryptosystems 33
CONTENTS
1.6.1 Some useful preliminaries 33
1.6.2 Key lengths and keyspaces 35
1.6.3 Breaking encryption algorithms 37
1.6.4 Exhaustive key searches 38
1.6.5 Classes of attack 41
1.6.6 Academic attacks 43
1.7 Summary 44
1.8 Further reading 45
1.9 Activities 46
2. Historical Cryptosystems............................................... 52
2.1 Monoalphabetic ciphers 53
2.1.1 Caesar Cipher 53
2.1.2 Simple Substitution Cipher 56
2.1.3 Frequency analysis 59
2.1.4 A study of theory versus practice 62
2.2 Historical advances 64
2.2.1 Design improvements 64
2.2.2 Playfair Cipher 65
2.2.3 Homophonic encoding 70
2.2.4 Vigenere Cipher 73
2.3 Summary 77
2.4 Further reading 77
2.5 Activities 78
3. Theoretical versus Practical Security............................ B3
3.1 Theoretical security 83
3.1.1 Perfect secrecy 84
3.1.2 A simple cryptosystem offering perfect secrecy 85
3.1.3 One-time pads 87
3.1.4 Theoretical security summary 94
3.2 Practical security 94
3.2.1 One-time pad in practice 95
3.2.2 Cover time 97
3.2.3 Computational complexity 98
3.2.4 Design process of a cryptosystem 103
3.2.5 Evaluating security 105
3.2.6 Adequate security 107
3.2.7 Towards a notion of practical security 108
3.3 Summary 109
3.4 Further reading 110
3.5 Activities 110
XVlll
CONTENTS
II The Cryptographic Toolkit 115
A. Symmetric Encryption ..............................
4-1 Classification of symmetric encryption algorithms 117
4.2 Stream ciphers 120
4.2.1 Model of a stream cipher 120
4.2.2 Key management of stream ciphers 121
4.2.3 The impact of errors 122
4.2.4 Properties of stream ciphers 124
4.2.5 Examples of stream ciphers 125
4-3 Block ciphers 126
4.3.1 Model of a block cipher 127
4.3.2 Properties of block ciphers 128
4.3.3 Block cipher algorithms 129
4-4 The Data Encryption Standard 130
4.4.1 Feistel Cipher 131
4.4.2 Specification of DES 133
4.4.3 Brief history of DES 133
4.4.4 Triple DES 137
4-5 The Advanced Encryption Standard 139
4.5.1 Development of AES 139
4.5.2 D esign of AES 140
4.5.3 AES today 142
4.6 Modes of operation 143
4.6.1 Electronic Code Book mode 143
4.6.2 Cipher Block Chaining mode 146
4.6.3 Cipher Feedback mode 152
4.6.4 Counter mode 156
4.6.5 Comparing modes of operation 159
4-7 Use of symmetric encryption 160
4.7.1 Other types of symmetric encryption 160
4.7.2 The future for symmetric encryption 161
4.8 Summary 162
4-9 Further reading 162
4.10 Activities 164
5. Public-Key Encryption .............................. ......168
5-1 Public-key cryptography 169
5.1.1 Motivation for public-key cryptography 169
5.1.2 Properties of public-key cryptosystems 171
5.1.3 Some mathematical preliminaries 174
5.1.4 One-way functions for public-key cryptography 176
5-2 RSA 180
5.2.1 Setting up RSA 180
XIX
CONTENTS
5.2.2 Encryption and decryption using RSA 182
5.2.3 Security of RSA 183
5.2.4 RSA in practice 186
5.3 ElGamal and elliptic curve variants 188
5.3.1 Setting up ElGamal 189
5.3.2 Encryption and decryption using ElGamal 190
5.3.3 Security of ElGamal 192
5.3.4 ElGamal in practice 19З
5.3.5 Elliptic Curve Cryptography 194
5.4 Comparison of RSA, ElGamal, and ECC 195
5.4.1 Popularity of RSA 195
5.4.2 Performance issues 195
5.4.3 Security issues 196
5.5 Use of public-key encryption 199
5.5.1 Limiting factors 199
5.5.2 Hybrid encryption 200
5.5.3 Other types of public-key cryptosystem 201
5.5.4 The future for public-key cryptosystems 203
5.6 Summary 203
5*7 Further reading 204
5.8 Activities 205
Data Integrity........................................... . 210
6.1 Different levels of data integrity 211
6.2 Hash functions 212
6.2.1 Properties of a hash function 213
6.2.2 Applications of hash functions 217
6.2.3 Attacking hash functions in theory 223
6.2.4 Hash functions in practice 228
6.2.5 SHA-3 230
6.З Message authentication codes 2ЗЗ
6.3.1 Does symmetric encryption provide data origin authentication? 234
6.3.2 MAC properties 235
6.3.3 CBC-MAC 238
6.3.4 HMAC 242
6.3.5 MACs and non-repudiation 243
6.3.6 Using MACs with encryption 244
6.4 Summary 249
6.5 Further reading 249
6.6 Activities 250
Digital Signature Schemes................................ 255
7*1 Digital signatures 255
7.1.1 The basic idea 256
XX
CONTENTS
7.1.2 Electronic signatures
7.1.3 Digital signature scheme fundamentals
7.2 Non-repudiation using symmetric techniques
7.2.1 Arbitrated digital signature schemes
7.2.2 Asymmetric trust relationships
7.2.3 Enforced trust
7.3 Digital signature schemes based on RSA
7.3.1 Complementary requirements
7.3.2 Basic model of a digital signature scheme
7.3.3 Two different approaches
7.3.4 RSA digital signature scheme with appendix
7.3.5 RSA digital signature scheme with message recovery
7.3.6 Other digital signature schemes
7.4 Digital signature schemes in practice
7.4.1 Security of digital signature schemes
7.4.2 Using digital signature schemes with encryption
7.4.3 Relationship with handwritten signatures
7.4.4 Relationship with advanced electronic signatures
7.5 Summary
7.6 Further reading
7.7 Activities
8. Entity Authentication ....................................
8.1 Random number generation
8.1.1 The need for randomness
8.1.2 What is randomness?
8.1.3 Non-deterministic generators
8.1.4 Deterministic generators
8.2 Providing freshness
8.2.1 Clock-based mechanisms
8.2.2 Sequence numbers
8.2.3 Nonce-based mechanisms
8.2.4 Comparison of freshness mechanisms
8.3 Fundamentals of entity authentication
8.3.1 A problem with entity authentication
8.3.2 Applications of entity authentication
8.3.3 General categories of identification information
8.4 Passwords
8.4.1 Problems with passwords
8.4.2 Cryptographic password protection
8.5 Dynamic password schemes
8.5.1 Idea behind dynamic password schemes
8.5.2 Example dynamic password scheme
8.6 Zero-knowledge mechanisms
256
258
259
259
261
262
263
263
264
265
266
271
274
275
275
277
278
282
283
283
284
288
288
289
290
290
292
295
295
296
299
300
301
302
303
303
306
306
308
310
310
311
314
XXI
CONTENTS
8.6.1 Motivation for zero-knowledge
8.6.2 Zero-knowledge analogy
8.6.3 Zero-knowledge in practice
8.7 Summary
8.8 Further reading
8.9 Activities
9. Cryptographic Protocols............................
9.1 Protocol basics
9.1.1 Operational motivation for protocols
9.1.2 Environmental motivation for protocols
9.1.3 Components of a cryptographic protocol
9.2 From objectives to a protocol
9.2.1 Stages of protocol design
9.2.2 Challenges of the stages of protocol design
9.2.3 Assumptions and actions
9.2.4 The wider protocol design process
9.3 Analysing a simple protocol
9.3.1 A simple application
9.3.2 Protocol 1
9.3.3 Protocol 2
9.3.4 Protocol 3
9.3.5 Protocol 4
9.3.6 Protocol 5
9.3.7 Protocol 6
9.3.8 Protocol 7
9.3.9 Simple protocol summary
9.4 Authentication and key establishment protocols
9.4.1 Typical AKE protocol goals
9.4.2 Diffie-Hellman key agreement protocol
9.4.3 An AKE protocol based on key distribution
9.4.4 Perfect forward secrecy
9.5 Summary
9.6 Further reading
9.7 Activities
III Key Management
10. Key Management.....................................
10.x Key management fundamentals
10.1.1 What is key management?
10.1.2 The key lifecycle
10.1.3 Fundamental key management requirements
10.1.4 Key management systems
315
315
317
318
318
319
325
326
326
327
327
328
329
330
331
333
333
334
335
339
340
343
345
348
349
351
351
352
354
362
366
367
367
368
373
375
376
376
377
378
380
XXII
CONTENTS
10.2 Key lengths and lifetimes 381
10.2.1 Key lifetimes 381
10.2.2 Choosing a key length 383
10.3 Key generation 384
10.3.1 Direct key generation 385
10.3.2 Key derivation 385
10.3.3 Key generation from components 387
10.3.4 Public-key pair generation 388
10.4 Key establishment 389
10.4.1 Key hierarchies 390
10.4.2 Unique key per transaction schemes 395
10.4.3 Quantum key establishment 399
10.5 Key storage 402
10.5.1 Avoiding key storage 402
10.5.2 Key storage in software 403
10.5.3 Key storage in hardware 405
10.5.4 Key storage risk factors 408
10.5.5 Key backup, archival, and recovery 410
10.6 Key usage 412
10.6.1 Key separation 412
10.6.2 Key change 416
10.6.3 Key activation 419
10.6.4 Key destruction 420
10.7 Governing key management 421
10.7.1 Key management policies, practices, and procedures 421
10.7.2 Example procedure: key generation ceremony 422
10.8 Summary 424
10.9 Further reading 424
10.10 Activities 425
11. Public-Key Management .....................................................431
11.1 Certification of public keys 432
11.1.1 Motivation for public-key certificates 432
11.1.2 Public-key certificates 435
11.2 The certificate lifecycle 438
11.2.1 Differences in the certificate lifecycle 438
11.2.2 Certificate creation 439
11.2.3 Key pair change 444
11.3 Public-key management models 44b
11.3.1 Choosing a CA 447
11.3.2 Public-key certificate management models 447
11.3.3 Joining CA domains 451
11.4 Alternative approaches 454
11.4.1 Webs of trust 455
11.4.2 Identity-based encryption 456
xxiii
CONTENTS
11.5 Summary 460
11.6 Further reading 461
11.7 Activities 462
Use of Cryptography 467
Cryptographic Applications............................................469
12.1 Cryptography for securing the Internet 471
12.1.1 TLS background 471
12.1.2 TLS security requirements 472
12.1.3 Cryptography used in TLS 472
12.1.4 TLS 1.2 and earlier versions 473
12.1.5 TLS 1.3 478
12.1.6 TLS key management 481
12.1.7 TLS security issues 483
12.1.8 TLS design considerations 484
12.2 Cryptography for wireless local area networks 485
12.2.1 WLAN background 485
12.2.2 WLAN security requirements 487
12.2.3 WEP 488
12.2.4 Attacks on WEP 491
12.2.5 WPA and WPA2 495
12.2.6 WLAN security issues 498
12.2.7 WLAN design considerations 498
12.3 Cryptography for mobile telecommunications 499
12.3.1 Mobile telecommunications background 500
12.3.2 GSM security requirements 500
12.3.3 Cryptography used in GSM 502
12.3.4 UMTS 507
12.3.5 LTE 509
12.3.6 GSM, UMTS, and LTE key management 511
12.3.7 Mobile telecommunications security issues 513
12.3.8 Mobile telecommuncations design considerations 513
12.4 Cryptography for secure payment card transactions 514
12.4.1 Background to payment card services 514
12.4.2 Magnetic stripe cards 515
12.4.3 EMV cards 518
12.4.4 Using EMV cards for internet transactions 521
12.4.5 Using EMV cards for authentication 523
12.4.6 Using EMV cards for mobile payments 524
12.4.7 Payment card key management 526
12.4.8 Payment card security issues 528
12.4.9 Payment card cryptographic design considerations 528
XXIV
CONTENTS
12-5 Cryptography for video broadcasting 529
12.5.1 Video broadcasting background 529
12.5.2 Video broadcasting security requirements 531
12.5.3 Cryptography used in video broadcasting 532
12.5.4 Key management for video broadcasting 533
12.5.5 Video broadcast security issues 537
12.5.6 Video broadcast design considerations 537
12.6 Cryptography for identity cards 538
12.6.1 elD background 538
12.6.2 elD security requirements 540
12.6.3 Cryptography used in elD cards 541
12.6.4 Provision of the elD card core functions 541
12.6.5 elD key management 544
12.6.6 elD security issues 549
12.6.7 elD design considerations 549
12.7 Cryptography for anonymity 550
12.7.1 Tor background 550
12.7.2 Tor security requirements 551
12.7.3 How Tor works 552
12.7.4 Tor security issues 560
12.7.5 Tor design considerations 560
12.8 Cryptography for digital currency 561
12.8.1 Bitcoin background 561
12.8.2 Bitcoin security requirements 562
12.8.3 Bitcoin transactions 563
12.8.4 Bitcoin blockchain 565
12.8.5 Bitcoin mining 568
12.8.6 Bitcoin security issues 572
12.8.7 Bitcoin design considerations 573
12.9 Summary 574
12.10 Further reading 575
12.11 Activities 576
Cryptography for Personal Devices ............... .........582
13.1 File protection 583
13.1.1 Full disk encryption 584
13.1.2 Virtual disk encryption 586
13.1.3 Individual file encryption 587
13.2 Email security 588
13.2.1 The need for email security 588
13.2.2 Techniques for securing email 590
13-3 Messaging security 592
13.3.1 WhatsApp security requirements 593
13.3.2 Cryptography used in WhatsApp 593
XXV
CONTENTS
13.4 Platform security 596
13.4.1 Cryptographic protection of iOS user data 596
13.4.2 Cryptographic protection of iOS internet services 598
13.4.3 Further iOS cryptographic support 599
13.5 Summary 600
13.6 Further reading 600
13.7 Activities 6ox
14. Control of Cryptography................................................604
14.1 The cryptography dilemma 605
14.1.1 The case for controlling the use of cryptography 606
14.1.2 The case against controlling the use of cryptography 606
14.1.3 Seeking a balance 607
14.1.4 Strategies for controlling the use of cryptography 608
14.2 Backdoors in algorithms 609
14.2.1 Use of backdoors 609
14.2.2 Dual_EC__DRBG 611
14.3 Legal mechanisms 612
14.3.1 Export restrictions 612
14.3.2 Key escrow 613
14.3.3 Legal requirements to access plaintext 615
14.4 Control of cryptography in an age
of complexity 615
14.4.1 The Snowden revelations 616
14.4.2 Changes to the cryptographic environment 617
14.4.3 Strategies for controlling ubiquitous cryptograph у 620
14.5 Summary 624
14.6 Further reading 625
14.7 Activities 626
15. Closing Remarks........................................................630
Mathematics Appendix........................................................632
Ал Decimal, binary, and hex 632
A.1.1 Decimal 633
A.1.2 Binary 634
A.1.3 XOR 637
A.1.4 Hex 638
A.1.5 ASCII 640
A.2 Modular arithmetic 640
A.2.1 Motivation 641
A.2.2 Modular numbers 642
A.2.3 Modular arithmetic operations 645
XXVI
CONTENTS
A.3 The mathematics of RSA
A.3.1 Primes and coprimes
A.3.2 Multiplicative inverses
A.3.3 RSA key pair setup
A.3.4 Why RSA works
A.4 The mathematics of ElGamal
A.4.1 ElGamal public keys
A.4.2 Why ElGamal works
A.5 Further reading
646
646
647
6 49
650
651
651
653
653
Bibliography
Index
655
667
xxvii
|
any_adam_object | 1 |
author | Martin, Keith M. |
author_GND | (DE-588)1020725265 |
author_facet | Martin, Keith M. |
author_role | aut |
author_sort | Martin, Keith M. |
author_variant | k m m km kmm |
building | Verbundindex |
bvnumber | BV044365200 |
classification_rvk | SK 170 ST 276 |
ctrlnum | (OCoLC)1002242075 (DE-599)BVBBV044365200 |
discipline | Informatik Mathematik |
edition | Second edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01544nam a2200373 c 4500</leader><controlfield tag="001">BV044365200</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220428 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">170622s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198788010</subfield><subfield code="c">Pb.: £ 34.99</subfield><subfield code="9">978-0-19-878801-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780198788003</subfield><subfield code="c">Hb.: £ 85.40</subfield><subfield code="9">978-0-19-878800-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1002242075</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044365200</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SK 170</subfield><subfield code="0">(DE-625)143221:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Martin, Keith M.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1020725265</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Everyday cryptography</subfield><subfield code="b">fundamental principles and applications</subfield><subfield code="c">Keith M. Martin</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Oxford University Press</subfield><subfield code="c">2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxx, 674 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturverzeichnis Seite [655]-666</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029767736&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029767736</subfield></datafield></record></collection> |
id | DE-604.BV044365200 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:50:54Z |
institution | BVB |
isbn | 9780198788010 9780198788003 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029767736 |
oclc_num | 1002242075 |
open_access_boolean | |
owner | DE-706 DE-703 DE-739 DE-20 DE-83 |
owner_facet | DE-706 DE-703 DE-739 DE-20 DE-83 |
physical | xxx, 674 Seiten Illustrationen |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Oxford University Press |
record_format | marc |
spelling | Martin, Keith M. Verfasser (DE-588)1020725265 aut Everyday cryptography fundamental principles and applications Keith M. Martin Second edition Oxford Oxford University Press 2017 xxx, 674 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Literaturverzeichnis Seite [655]-666 Hier auch später erschienene, unveränderte Nachdrucke Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptologie (DE-588)4033329-2 s DE-604 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029767736&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Martin, Keith M. Everyday cryptography fundamental principles and applications Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Everyday cryptography fundamental principles and applications |
title_auth | Everyday cryptography fundamental principles and applications |
title_exact_search | Everyday cryptography fundamental principles and applications |
title_full | Everyday cryptography fundamental principles and applications Keith M. Martin |
title_fullStr | Everyday cryptography fundamental principles and applications Keith M. Martin |
title_full_unstemmed | Everyday cryptography fundamental principles and applications Keith M. Martin |
title_short | Everyday cryptography |
title_sort | everyday cryptography fundamental principles and applications |
title_sub | fundamental principles and applications |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029767736&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT martinkeithm everydaycryptographyfundamentalprinciplesandapplications |