Serious cryptography: a practical introduction to modern encryption
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
[2018]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Auf dem Cover: "Forword by Matthew D. Green Hier auch später erschienene, unveränderte Nachdrucke |
Beschreibung: | xxii, 282 Seiten Illustrationen, Diagramme |
ISBN: | 9781593278267 1593278268 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044523134 | ||
003 | DE-604 | ||
005 | 20240610 | ||
007 | t | ||
008 | 171005s2018 a||| |||| 00||| eng d | ||
020 | |a 9781593278267 |c pbk. |9 978-1-59327-826-7 | ||
020 | |a 1593278268 |c pbk. |9 1-59327-826-8 | ||
035 | |a (OCoLC)1028065796 | ||
035 | |a (DE-599)BVBBV044523134 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-11 |a DE-898 |a DE-19 |a DE-Aug4 |a DE-573 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Aumasson, Jean-Philippe |e Verfasser |0 (DE-588)1068930497 |4 aut | |
245 | 1 | 0 | |a Serious cryptography |b a practical introduction to modern encryption |c by Jean-Philippe Aumasson |
264 | 1 | |a San Francisco |b No Starch Press |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xxii, 282 Seiten |b Illustrationen, Diagramme | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Auf dem Cover: "Forword by Matthew D. Green | ||
500 | |a Hier auch später erschienene, unveränderte Nachdrucke | ||
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Chiffrierung |0 (DE-588)4352893-4 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Chiffrierung |0 (DE-588)4352893-4 |D s |
689 | 0 | 1 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029922590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
Datensatz im Suchindex
_version_ | 1805083759269117952 |
---|---|
adam_text |
BRIEF CONTENTS
Foreword by Matthew D. Green.xv
Preface.xvii
Abbreviations.xxi
Chapter 1: Encryption. 1
Chapter 2: Randomness.21
Chapter 3: Cryptographic Security.39
Chapter 4: Block Ciphers.53
Chapter 5: Stream Ciphers.77
Chapter 6: Hash Functions. 105
Chapter 7: Keyed Hashing. 127
Chapter 8: Authenticated Encryption. 145
Chapter 9: Hard Problems. 163
Chapter 10: RSA.181
Chapter 11: Diffie-Hellman.201
Chapter 12: Elliptic Curves.217
Chapter 13: TLS.235
Chapter 14: Quantum and Post-Quantum.251
Index
271
CONTENTS IN DETAIL
FOREWORD by Matthew D. Green
xv
PREFACE
xvii
This Book's Approach.xviii
Who This Book Is For.xviii
How This Book Is Organized.xix
Fundamentals.xix
Symmetric Crypto.xix
Asymmetric Crypto.xix
Applications.xx
Acknowledgments.xx
ABBREVIATIONS
xxi
1
ENCRYPTION 1
The Basics.2
Classical Ciphers.2
The Caesar Cipher.2
The Vigenere Cipher.3
How Ciphers Work.4
The Permutation.4
The Mode of Operation.5
Why Classical Ciphers Are Insecure.6
Perfect Encryption: The One-Time Pad.7
Encrypting with the One-Time Pad.7
Why Is the One-Time Pad Secure?.8
Encryption Security.9
Attack Models.10
Security Goals.12
Security Notions. 13
Asymmetric Encryption.1-5
When Ciphers Do More Than Encryption. 16
Authenticated Encryption. 16
Format-Preserving Encryption. 16
Fully Homomorphic Encryption.17
Searchable Encryption. 17
Tweakable Encryption. 17
How Things Can Go Wrong. 18
Weak Cipher. 18
Wrong Model. 19
Further Reading. 19
2
RANDOMNESS 21
Random or Non-Random?.*.22
Randomness as a Probability Distribution.22
Entropy: A Measure of Uncertainty.23
Random Number Generators (RNGs) and
Pseudorandom Number Generators (PRNGs).24
How PRNGs Work.25
Security Concerns.26
The PRNG Fortuna.26
Cryptographic vs. Non-Cryptographic PRNGs.27
The Uselessness of Statistical Tests.29
Real-World PRNGs.29
Generating Random Bits in Unix-Based Systems . .30
The CryptGenRandom() Function in Windows.33
A Hardware-Based PRNG: RDRAND in Intel Microprocessors.34
How Things Can Go Wrong.35
Poor Entropy Sources.35
Insufficient Entropy at Boot Time.35
Non-cryptographic PRNG.36
Sampling Bug with Strong Randomness.37
Further Reading.38
3
CRYPTOGRAPHIC SECURITY 39
Defining the Impossible. 40
Security in Theory: Informational Security.40
Security in Practice: Computational Security.40
Quantifying Security.42
Measuring Security in Bits.42
Full Attack Cost.43
Choosing and Evaluating Security Levels.44
Achieving Security.46
Provable Security.46
Heuristic Security.48
Generating Keys.49
Generating Symmetric Keys.49
Generating Asymmetric Keys.49
Protecting Keys.50
How Things Can Go Wrong.51
Incorrect Security Proof.52
Short Keys for Legacy Support.52
Further Reading.52
4
BLOCK CIPHERS 53
What Is a Block Cipher?.54
Security Goals. 54
Block Size.54
The Codebook Attack.55
vlii Contents in Detail
How to Construct Block Ciphers.55
A Block Cipher's Rounds.56
The Slide Attack and Round Keys.56
Substitution-Permutation Networks.57
Feistel Schemes.58
The Advanced Encryption Standard (AES).59
AES Internals.59
AES in Action.62
Implementing AES.62
Table-Based Implementations.63
Native Instructions.63
Is AES Secure?.65
Modes of Operation.65
The Electronic Codebook (ECB) Mode.65
The Cipher Block Chaining (CBC) Mode.67
How to Encrypt Any Message in CBC Mode.69
The Counter (CTR) Mode.71
How Things Can Go Wrong.72
Meet-in-the-Middle Attacks.72
Padding Oracle Attacks.74
Further Reading.75
5
STREAM CIPHERS 77
How Stream Ciphers Work.78
Stateful and Counter-Based Stream Ciphers.79
Hardware-Oriented Stream Ciphers.79
Feedback Shift Registers.80
Grain-128a.86
A5/1 .88
Software-Oriented Stream Ciphers.91
RC4.92
Salsa20.95
How Things Can Go Wrong. 100
Nonce Reuse. 101
Broken RC4 Implementation. 101
Weak Ciphers Baked Into Hardware. 102
Further Reading. 103
6
HASH FUNCTIONS 105
Secure Hash Functions.
Unpredictability Again.
Preimage Resistance.
Collision Resistance.
Finding Collisions.
Building Hash Functions.
Compression-Based Hash Functions: The Merkle-Damgard Construction . . . .
Permutation-Based Hash Functions: Sponge Functions.
106
107
107
109
109
111
112
115
Contents in Detail IX
The SHA Family of Hash Functions.116
SHA-1.116
SHA-2.119
The SHA-3 Competition.120
Keccak (SHA-3).121
The BLAKE2 Hash Function.123
How Things Can Go Wrong.124
The Length-Extension Attack.125
Fooling Proof-of-Storage Protocols.125
Further Reading.126
7
KEYED HASHING 127
Message Authentication Codes (MACs). 128
MACs in Secure Communication.128
Forgery and Chosen-Message Attacks . 128
Replay Attacks.129
Pseudorandom Functions (PRFs). 129
PRF Security. 129
Why PRFs Are Stronger Than MACs. 130
Creating Keyed Hashes from Unkeyed Hashes.130
The Secret-Prefix Construction. 130
The Secret-Suffix Construction. 131
The HMAC Construction. 132
A Generic Attack Against Hash-Based MACs.133
Creating Keyed Hashes from Block Ciphers: CMAC. 134
Breaking CBC-MAC. 134
Fixing CBC-MAC. 134
Dedicated MAC Designs. 135
Poly 1305. 136
SipHash. 139
How Things Can Go Wrong. 140
Timing Attacks on MAC Verification. 140
When Sponges Leak. 142
Further Reading. 143
8
AUTHENTICATED ENCRYPTION 145
Authenticated Encryption Using MACs. 146
Encrypt-and-MAC. 146
MAC-then-Encrypt. 147
Encrypt-then-MAC. 147
Authenticated Ciphers. 148
Authenticated Encryption with Associated Data. 149
Avoiding Predictability with Nonces. 149
What Makes a Good Authenticated Cipher?. 150
AES-GCM: The Authenticated Cipher Standard. 152
GCM Internals: CTR and GHASH. 152
GCM Security. 154
GCM Efficiency. 154
X Contents in Detail
OCB: An Authenticated Cipher Faster than GCM. 155
OCB Internals. 155
OCB Security. 155
OCB Efficiency. 156
SIV: The Safest Authenticated Cipher?. 156
Permutation-Based AEAD. 157
How Things Can Go Wrong. 159
AES-GCM and Weak Hash Keys. 159
AES-GCM and Small Tags. 161
Further Reading. 161
9
HARD PROBLEMS 163
Computational Hardness. 164
Measuring Running Time. 164
Polynomial vs. Superpolynomial Time. 166
Complexity Classes. 168
Nondeterministic Polynomial Time. 168
NP-Complete Problems. 169
The P vs. NP Problem. 170
The Factoring Problem. 171
Factoring Large Numbers in Practice. 172
Is Factoring NP-Complete?. 173
The Discrete Logarithm Problem. 174
What Is a Group?. 174
The Hard Thing. 175
How Things Can Go Wrong. 176
When Factoring Is Easy. 176
Small Hard Problems Aren't Hard. 177
Further Reading. 178
10
RSA 181
The Math Behind RSA. 182
The RSA Trapdoor Permutation. 183
RSA Key Generation and Security. 184
Encrypting with RSA. 185
Breaking Textbook RSA Encryption's Malleability. 185
Strong RSA Encryption: OAEP. 186
Signing with RSA. 188
Breaking Textbook RSA Signatures.188
The PSS Signature Standard. 189
Full Domain Hash Signatures. 190
RSA Implementations. 191
Fast Exponentiation Algorithm: Square-and-Multiply. 192
Small Exponents for Faster Public-Key Operations. 194
The Chinese Remainder Theorem. 195
Contents in Detail XI
How Things Can Go Wrong. 196
The Bellcore Attack on RSA-CRT.196
Sharing Private Exponents or Moduli.197
Further Reading. 199
11
DIFFIE-HELLMAN 201
The Diffie-Heliman Function.202
The Diffie-Heliman Problems.204
The Computational Diffie-Heliman Problem.204
The Decisional Diffie-Heliman Problem.204
More Diffie-Heliman Problems.205
Key Agreement Protocols.205
An Example of Non֊DH Key Agreement.205
Attack Models for Key Agreement Protocols . .207
Performance.208
Diffie-Heliman Protocols.209
Anonymous Diffie-Heliman.209
Authenticated Diffie-Heliman.210
Menezes-Qu-Vanstone (MQV).213
How Things Can Go Wrong.214
Not Hashing the Shared Secret.214
Legacy Diffie-Heliman in TLS.215
Unsafe Group Parameters.215
Further Reading.216
12
ELLIPTIC CURVES 217
What Is an Elliptic Curve?.218
Elliptic Curves over Integers.219
Adding and Multiplying Points.221
Elliptic Curve Groups. 224
The ECDLP Problem.224
Diffie-Heliman Key Agreement over Elliptic Curves.225
Signing with Elliptic Curves.226
Encrypting with Elliptic Curves.228
Choosing a Curve.229
NIST Curves.230
Curve25519 . 230
Other Curves.231
How Things Can Go Wrong.231
ECDSA with Bad Randomness.232
Breaking ECDH Using Another Curve.232
Further Reading.233
XII Contents in Detail
13
TLS 235
Target Applications and Requirements.236
The TLS Protocol Suite.236
The TLS and SSL Family of Protocols: A Brief History.237
TLS in a Nutshell.237
Certificates and Certificate Authorities.238
The Record Protocol.240
The TLS Handshake Protocol.241
TLS 1.3 Cryptographic Algorithms.243
TLS 1.3 Improvements over TLS 1.2.244
Downgrade Protection.244
Single Round-Trip Handshake.245
Session Resumption.245
The Strengths of TLS Security.246
Authentication.246
Forward Secrecy.246
How Things Can Go Wrong.247
Compromised Certificate Authority.247
Compromised Server.248
Compromised Client .248
Bugs in Implementations.248
Further Reading.249
14
QUANTUM AND POST-QUANTUM 251
How Quantum Computers Work.252
Quantum Bits.252
Quantum Gates.255
Quantum Speed-Up.257
Exponential Speed-Up and Simon's Problem.258
The Threat of Shor's Algorithm.259
Shor's Algorithm Solves the Factoring Problem.259
Shor's Algorithm and the Discrete Logarithm Problem.260
Grover's Algorithm.260
Why Is It So Hard to Build a Quantum Computer?.261
Post-Quantum Cryptographic Algorithms.263
Code-Based Cryptography.263
Lattice-Based Cryptography.264
Multivariate Cryptography.265
Hash-Based Cryptography.266
How Things Can Go Wrong .267
Unclear Security Level.267
Fast Forward: What Happens if It's Too Late?.268
Implementation Issues.269
Further Reading.269
INDEX 271
Contents in Detail
XIII |
any_adam_object | 1 |
author | Aumasson, Jean-Philippe |
author_GND | (DE-588)1068930497 |
author_facet | Aumasson, Jean-Philippe |
author_role | aut |
author_sort | Aumasson, Jean-Philippe |
author_variant | j p a jpa |
building | Verbundindex |
bvnumber | BV044523134 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1028065796 (DE-599)BVBBV044523134 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 c 4500</leader><controlfield tag="001">BV044523134</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20240610</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">171005s2018 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593278267</subfield><subfield code="c">pbk.</subfield><subfield code="9">978-1-59327-826-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1593278268</subfield><subfield code="c">pbk.</subfield><subfield code="9">1-59327-826-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1028065796</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044523134</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-573</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Aumasson, Jean-Philippe</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1068930497</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Serious cryptography</subfield><subfield code="b">a practical introduction to modern encryption</subfield><subfield code="c">by Jean-Philippe Aumasson</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 282 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Auf dem Cover: "Forword by Matthew D. Green</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Hier auch später erschienene, unveränderte Nachdrucke</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Chiffrierung</subfield><subfield code="0">(DE-588)4352893-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029922590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield></record></collection> |
id | DE-604.BV044523134 |
illustrated | Illustrated |
indexdate | 2024-07-20T07:53:39Z |
institution | BVB |
isbn | 9781593278267 1593278268 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029922590 |
oclc_num | 1028065796 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-11 DE-898 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-573 |
owner_facet | DE-473 DE-BY-UBG DE-11 DE-898 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-573 |
physical | xxii, 282 Seiten Illustrationen, Diagramme |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | No Starch Press |
record_format | marc |
spelling | Aumasson, Jean-Philippe Verfasser (DE-588)1068930497 aut Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson San Francisco No Starch Press [2018] © 2018 xxii, 282 Seiten Illustrationen, Diagramme txt rdacontent n rdamedia nc rdacarrier Auf dem Cover: "Forword by Matthew D. Green Hier auch später erschienene, unveränderte Nachdrucke Kryptologie (DE-588)4033329-2 gnd rswk-swf Chiffrierung (DE-588)4352893-4 gnd rswk-swf Chiffrierung (DE-588)4352893-4 s Kryptologie (DE-588)4033329-2 s DE-604 Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029922590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Aumasson, Jean-Philippe Serious cryptography a practical introduction to modern encryption Kryptologie (DE-588)4033329-2 gnd Chiffrierung (DE-588)4352893-4 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4352893-4 |
title | Serious cryptography a practical introduction to modern encryption |
title_auth | Serious cryptography a practical introduction to modern encryption |
title_exact_search | Serious cryptography a practical introduction to modern encryption |
title_full | Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson |
title_fullStr | Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson |
title_full_unstemmed | Serious cryptography a practical introduction to modern encryption by Jean-Philippe Aumasson |
title_short | Serious cryptography |
title_sort | serious cryptography a practical introduction to modern encryption |
title_sub | a practical introduction to modern encryption |
topic | Kryptologie (DE-588)4033329-2 gnd Chiffrierung (DE-588)4352893-4 gnd |
topic_facet | Kryptologie Chiffrierung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=029922590&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT aumassonjeanphilippe seriouscryptographyapracticalintroductiontomodernencryption |