Cryptography:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Gistrup
River Publishers
cop. 2017
|
Schriftenreihe: | River Publishers series in information science and technology. Security and digital forensics
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis Inhaltsverzeichnis |
Beschreibung: | xxi, 402 Seiten Illustrationen |
ISBN: | 8793379102 9788793379107 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV044901348 | ||
003 | DE-604 | ||
005 | 20180524 | ||
007 | t | ||
008 | 180412s2017 a||| |||| 00||| eng d | ||
020 | |a 8793379102 |9 8793379102 | ||
020 | |a 9788793379107 |9 9788793379107 | ||
035 | |a (OCoLC)1038774308 | ||
035 | |a (DE-599)BVBBV044901348 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 |a DE-706 | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
100 | 1 | |a Buchanan, William |d 1961- |e Verfasser |0 (DE-588)122678036 |4 aut | |
245 | 1 | 0 | |a Cryptography |c William J. Buchanan |
264 | 1 | |a Gistrup |b River Publishers |c cop. 2017 | |
300 | |a xxi, 402 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a River Publishers series in information science and technology. Security and digital forensics | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Cryptography | |
653 | 0 | |a Cryptography | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-030295142 |
Datensatz im Suchindex
_version_ | 1804178456993333248 |
---|---|
adam_text | Contents
Acknowledgement xiii
List of Figures xv
List of Tables xxi
Introduction 1
1 Ciphers and Fundamentals 3
1.1 Introduction.............................................. 3
1.2 Simple Cipher Methods.................................... 5
1.2.1 Morse Code......................................... 5
1.2.2 Pigpen ............................................ 7
1.2.3 Rail Code.......................................... 8
1.2.4 BIFID Cipher....................................... 9
1.2.5 Playfair.......................................... 11
1.2.6 Homophonic Substitution Code...................... 13
1.2.7 Caesar Coding and Scrambled Alphabet.............. 14
1.2.8 Vigenere Cipher................................... 17
1.2.9 One-Time Pad (OTP)................................ 18
1.3 Encoding Methods......................................... 21
1.3.1 Hexadecimal and Base-64........................... 22
1.4 Huffman Coding and Lempel-Viz Welsh (LZW)............ 25
1.5 Data Integrity (CRC-32).................................. 29
1.6 Little Endian or Big Endian.............................. 29
1.7 Introduction to Probability and Number Theory............ 30
1.7.1 Combinations and Permutations..................... 30
1.7.2 Probability Theory................................ 31
1.7.3 Set Theory........................................ 32
1.7.4 Number Representations............................ 32
1.7.5 Logarithms........................................ 33
v
vi Contents
1.8 Prime Numbers............................................ 34
1.9 Encryption Operators (mod, EX-OR and shift).............. 34
1.9.1 Mod Operator...................................... 35
1.9.2 Shift-Operators................................... 35
1.9.3 Integers and Big Integers......................... 36
1.9.4 X-OR.............................................. 38
1.9.5 Modulo-2 Operations............................... 39
1.10 GCD...................................................... 41
1.11 Random Number Generators................................. 42
1.11.1 Linear Congruential Random Numbers................ 42
1.12 Frequency Analysis....................................... 44
1.13 Lab/tutorial............................................. 48
2 Secret Key Encryption 49
2.1 Introduction............................................. 49
2.1.1 Early Days........................................ 49
2.1.2 Encryption........................................ 50
2.1.3 Secure Communications............................. 52
2.1.4 Modem Methods..................................... 52
2.2 Key-based Cryptography................................... 53
2.2.1 Computation Difficulty............................ 55
2.2.2 Stream Encryption and Block Encryption............ 57
2.2.3 Padding........................................... 59
2.3 Brute-Force Analysis..................................... 60
2.4 Adding Salt.............................................. 63
2.4.1 Cipher Block Chaining CBC......................... 65
2.4.2 Cipher Feedback (CFB) ............................ 67
2.4.3 Output Feedback (OFB)............................. 67
2.4.4 Counter Mode ..................................... 68
2.4.5 CBC Example ...................................... 70
2.5 AES...................................................... 71
2.5.1 Substitution Bytes (S-box)........................ 72
2.5.2 Shift Row Transformation.......................... 74
2.5.3 Mix Column Transformation......................... 75
2.5.4 Add Round Key Transformation...................... 76
2.6 Secret-Key Encryption.................................... 78
2.6.1 DES/3-DES......................................... 78
2.6.2 RC4............................................... 79
2.6.3 AES/Rijndael...................................... 80
Contents vii
2.6.4 IDEA............................................. 80
2.6.5 RC5.............................................. 80
2.6.6 Skipjack ........................................ 80
2.6.7 Blowfish ........................................ 81
2.6.8 Twofish.......................................... 81
2.6.9 Camellia......................................... 81
2.6.10 XTEA............................................. 81
2.7 Key Entropy.............................................. 81
2.8 OpenSSL.................................................. 84
2.9 Pohlog-Hellman........................................... 84
2.10 Lab/tutorial............................................. 85
3 Hashing 87
3.1 Introduction............................................. 87
3.2 Hashing Methods.......................................... 87
3.3 Problems with Hashes..................................... 91
3.3.1 Hash Cracking.................................... 93
3.4 Salting the Hash Value................................... 96
3.5 Common Hashing Methods................................... 97
3.5.1 LM Hashing....................................... 97
3.5.2 APR1 (MD5 with Salt)............................ 101
3.5.3 SHA1, SHA256 and SHA512......................... 102
3.5.4 PHPass.......................................... 103
3.5.5 Non-Cryptographic Hashes........................ 110
3.6 Authenticating the Sender............................... 113
3.7 HMAC (Hash Message Authentication Code)................. 117
3.8 Password Hashing........................................ 121
3.9 Password Cracking....................................... 131
3.10 One Time Passwords...................................... 135
3.11 Time Stamp Protocol..................................... 137
3.12 Winnowing and Chaffing.................................. 138
3.13 SHA-3................................................... 139
3.14 Lab/Tutorial............................................ 142
References.............................................. 142
4 Public Key 143
4.1 Introduction............................................ 143
4.2 RSA..................................................... 144
4.3 Elliptic Curve Ciphers (ECC)............................ 155
viii Contents
4.4 ElGamal.................................................... 160
4.5 Cramer-Shoup............................................... 161
4.6 Paillier Cryptosystem...................................... 162
4.7 Knapsack Encryption........................................ 163
4.8 Identity-Based Encryption.................................. 166
4.9 Lab/Tutorial............................................... 166
Reference.................................................. 166
5 Key Exchange 167
5.1 Introduction............................................... 167
5.2 Diffie-Hellman Key Exchange................................ 169
5.3 Creating the Generator..................................... 173
5.4 Diffie-Hellman Examples.................................... 175
5.5 Ephemeral Diffie-Hellman with RS A (DHE-RS A).............. 177
5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) .... 179
5.7 Diffie-Hellman Weaknesses.................................. 179
5.8 Using the Public Key to Pass a Secret Key.................. 181
5.9 Lab/Tutorial............................................... 182
6 Authentication and Digital Certificates 183
6.1 Introduction............................................... 183
6.2 Methods of Authentication.................................. 187
6.3 Digital Certificates and PKI............................... 189
6.3.1 PKI and Trust...................................... 190
6.3.2 Digital Certificate Types.......................... 194
6.3.3 Digital Certificate Reader ........................ 197
6.4 Key and Certificate Management............................. 199
6.5 Creating a Signed Certificate.............................. 201
6.6 Digital Certificate Passing ............................... 206
6.7 Email Encryption........................................... 211
6.8 Kerberos................................................... 212
6.9 Kerberos Key Sharing....................................... 215
6.10 Lab/Tutorial.............................................. 216
7 Tunneling 217
7.1 Introduction............................................... 217
7.2 SSL/TLS Connections ....................................... 217
7.3 SSL/TLS Handshaking........................................ 219
7.4 SSL Risks.................................................. 225
Contents ix
7.5 VPN Tunnels............................................... 226
7.6 IKE....................................................... 232
7.6.1 Phase 1........................................... 234
7.6.2 Phase 2........................................... 237
7.7 Tor....................................................... 240
7.7.1 Tor Encryption.................................... 243
7.7.2 Examining Tor Traffic............................. 245
7.8 Lab/Tutorial.............................................. 248
References............................................... 249
8 Crypto Cracking 251
8.1 Introduction.............................................. 251
8.2 Key Escrow................................................ 251
8.3 Cracking the Code ........................................ 254
8.4 RSA Cracking.............................................. 258
8.4.1 RSA Crack with Different e Value.................. 258
8.4.2 Cracking RSA by Factorizing N..................... 261
8.4.3 When Me Is less than N............................ 262
8.4.4 RSA Crack with Chinese Remainder
Theory (CRT)...................................... 263
8.4.5 Chosen Cipher Attack.............................. 264
8.4.6 Blinding Attack................................... 266
8.4.7 Bleichenbacher’s Attack........................... 269
8.5 AES Cracking.............................................. 271
8.5.1 AES Copy-and-Paste................................ 271
8.5.2 AES (Brute Force)................................. 273
8.5.3 AES Cracking with Non-Random Numbers.............. 274
8.6 Digital Certificate Cracking.............................. 276
8.7 Lab/Tutorial.............................................. 277
References............................................... 278
9 Light-weight Cryptography and Other Methods 279
9.1 Introduction.............................................. 279
9.2 Light-Weight Symmetric Methods............................ 280
9.3 Light-Weight Hashing...................................... 284
9.4 Other Light Weight Ciphers................................ 287
9.5 Secret Shares............................................. 291
9.6 Post Quantum Cryptography................................. 295
9.7 Lab/Tutorial.............................................. 301
References............................................... 301
x Contents
10 Blockchain and Crypto-currency 303
10.1 Introduction............................................ 303
10.2 Bitcoins, Blockchain and Miners..........................304
10.2.1 Bitcoin Transactions............................. 305
10.2.2 Mining Process................................... 308
10.3 Ethereum................................................ 311
10.3.1 Gas.............................................. 312
10.3.2 Practical Implementation of Ethereum............. 312
10.3.3 Smart Contracts.................................. 316
10.4 Lab/Tutorial............................................ 335
References.............................................. 335
11 Zero-knowledge Proof (ZKP) and Privacy Preserving 337
11.1 Introduction.......................................... 337
11.2 ZKP: Discrete Logs.................................... 338
11.3 Commutative Encryption................................ 339
11.4 Graphs and Hamiltonian Cycles......................... 340
11.5 Feige-Fiat-Shamir..................................... 343
11.6 Non-interactive Random Oracle Access
for Zero-knowledge Proof ............................. 345
11.7 A Fair Coin Flip...................................... 347
11.8 ZKP: Paillier......................................... 349
11.9 Oblivious Transfer (OT) .............................. 350
11.10 Scrambled Circuits.................................... 354
11.11 Millionaire’s Problem................................. 357
11.12 RAPPOR................................................ 360
11.13 Secure Function Evaluation (SFE)...................... 364
11.14 Secure Remote Password (SRP) Protocol ................ 365
11.15 Lab/Tutorial.......................................... 368
Reference............................................. 368
12 Wireless Cryptography and Stream Ciphers 369
12.1 Introduction............................................ 369
12.2 RC4..................................................... 371
12.3 WEP..................................................... 373
12.4 Wi-fi Standards......................................... 377
12.5 WPA and WPA-2........................................... 379
12.6 WPA-2 Handshaking....................................... 381
12.7 Cracking WPA-2 PSK ..................................... 383
Contents xi
12.8 Stream Ciphers............................................ 385
12.9 A5 Ciphers................................................ 388
12.9.1 Practical Systems.................................. 389
12.9.2 A5/3 390
12.10Lab/tutorial.............................................. 390
References................................................ 390
Appendix A 391
Index 395
About the Author
401
Contents
Acknowledgement xiii
List of Figures xv
List of Tables xxi
Introduction 1
1 Ciphers and Fundamentals 3
1.1 Introduction.............................................. 3
1.2 Simple Cipher Methods.................................... 5
1.2.1 Morse Code......................................... 5
1.2.2 Pigpen ............................................ 7
1.2.3 Rail Code.......................................... 8
1.2.4 BIFID Cipher....................................... 9
1.2.5 Playfair.......................................... 11
1.2.6 Homophonic Substitution Code...................... 13
1.2.7 Caesar Coding and Scrambled Alphabet.............. 14
1.2.8 Vigenere Cipher................................... 17
1.2.9 One-Time Pad (OTP)................................ 18
1.3 Encoding Methods......................................... 21
1.3.1 Hexadecimal and Base-64........................... 22
1.4 Huffman Coding and Lempel-Viz Welsh (LZW)............ 25
1.5 Data Integrity (CRC-32).................................. 29
1.6 Little Endian or Big Endian.............................. 29
1.7 Introduction to Probability and Number Theory............ 30
1.7.1 Combinations and Permutations..................... 30
1.7.2 Probability Theory................................ 31
1.7.3 Set Theory........................................ 32
1.7.4 Number Representations............................ 32
1.7.5 Logarithms........................................ 33
v
vi Contents
1.8 Prime Numbers............................................ 34
1.9 Encryption Operators (mod, EX-OR and shift).............. 34
1.9.1 Mod Operator...................................... 35
1.9.2 Shift-Operators................................... 35
1.9.3 Integers and Big Integers......................... 36
1.9.4 X-OR.............................................. 38
1.9.5 Modulo-2 Operations............................... 39
1.10 GCD...................................................... 41
1.11 Random Number Generators................................. 42
1.11.1 Linear Congruential Random Numbers................ 42
1.12 Frequency Analysis....................................... 44
1.13 Lab/tutorial............................................. 48
2 Secret Key Encryption 49
2.1 Introduction............................................. 49
2.1.1 Early Days........................................ 49
2.1.2 Encryption........................................ 50
2.1.3 Secure Communications............................. 52
2.1.4 Modem Methods..................................... 52
2.2 Key-based Cryptography................................... 53
2.2.1 Computation Difficulty............................ 55
2.2.2 Stream Encryption and Block Encryption............ 57
2.2.3 Padding........................................... 59
2.3 Brute-Force Analysis..................................... 60
2.4 Adding Salt.............................................. 63
2.4.1 Cipher Block Chaining CBC......................... 65
2.4.2 Cipher Feedback (CFB) ............................ 67
2.4.3 Output Feedback (OFB)............................. 67
2.4.4 Counter Mode ..................................... 68
2.4.5 CBC Example ...................................... 70
2.5 AES...................................................... 71
2.5.1 Substitution Bytes (S-box)........................ 72
2.5.2 Shift Row Transformation.......................... 74
2.5.3 Mix Column Transformation......................... 75
2.5.4 Add Round Key Transformation...................... 76
2.6 Secret-Key Encryption.................................... 78
2.6.1 DES/3-DES......................................... 78
2.6.2 RC4............................................... 79
2.6.3 AES/Rijndael...................................... 80
Contents vii
2.6.4 IDEA.............................................. 80
2.6.5 RC5............................................... 80
2.6.6 Skipjack ......................................... 80
2.6.7 Blowfish ......................................... 81
2.6.8 Twofish........................................... 81
2.6.9 Camellia.......................................... 81
2.6.10 XTEA.............................................. 81
2.7 Key Entropy.............................................. 81
2.8 OpenSSL.................................................. 84
2.9 Pohlog-Hellman........................................... 84
2.10 Lab/tutorial............................................. 85
3 Hashing 87
3.1 Introduction............................................. 87
3.2 Hashing Methods.......................................... 87
3.3 Problems with Hashes..................................... 91
3.3.1 Hash Cracking..................................... 93
3.4 Salting the Hash Value................................... 96
3.5 Common Hashing Methods................................... 97
3.5.1 LM Hashing........................................ 97
3.5.2 APR1 (MD5 with Salt)............................. 101
3.5.3 SHA1, SHA256 and SHA512.......................... 102
3.5.4 PHPass........................................... 103
3.5.5 Non-Cryptographic Hashes......................... 110
3.6 Authenticating the Sender............................... 113
3.7 HMAC (Hash Message Authentication Code)................. 117
3.8 Password Hashing........................................ 121
3.9 Password Cracking....................................... 131
3.10 One Time Passwords...................................... 135
3.11 Time Stamp Protocol..................................... 137
3.12 Winnowing and Chaffing.................................. 138
3.13 SHA-3................................................... 139
3.14 Lab/Tutorial............................................ 142
References.............................................. 142
4 Public Key 143
4.1 Introduction............................................ 143
4.2 RSA..................................................... 144
4.3 Elliptic Curve Ciphers (ECC)............................ 155
viii Contents
4.4 ElGamal.................................................... 160
4.5 Cramer-Shoup............................................... 161
4.6 Paillier Cryptosystem...................................... 162
4.7 Knapsack Encryption........................................ 163
4.8 Identity-Based Encryption.................................. 166
4.9 Lab/Tutorial............................................... 166
Reference.................................................. 166
5 Key Exchange 167
5.1 Introduction............................................... 167
5.2 Diffie-Hellman Key Exchange................................ 169
5.3 Creating the Generator..................................... 173
5.4 Diffie-Hellman Examples.................................... 175
5.5 Ephemeral Diffie-Hellman with RS A (DHE-RS A).............. 177
5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) .... 179
5.7 Diffie-Hellman Weaknesses.................................. 179
5.8 Using the Public Key to Pass a Secret Key.................. 181
5.9 Lab/Tutorial............................................... 182
6 Authentication and Digital Certificates 183
6.1 Introduction............................................... 183
6.2 Methods of Authentication.................................. 187
6.3 Digital Certificates and PKI............................... 189
6.3.1 PKI and Trust...................................... 190
6.3.2 Digital Certificate Types.......................... 194
6.3.3 Digital Certificate Reader ........................ 197
6.4 Key and Certificate Management............................. 199
6.5 Creating a Signed Certificate.............................. 201
6.6 Digital Certificate Passing ............................... 206
6.7 Email Encryption........................................... 211
6.8 Kerberos................................................... 212
6.9 Kerberos Key Sharing....................................... 215
6.10 Lab/Tutorial............................................... 216
7 Tunneling 217
7.1 Introduction............................................... 217
7.2 SSL/TLS Connections ....................................... 217
7.3 SSL/TLS Handshaking........................................ 219
7.4 SSL Risks.................................................. 225
Contents ix
7.5 VPN Tunnels............................................... 226
7.6 IKE....................................................... 232
7.6.1 Phase 1........................................... 234
7.6.2 Phase 2........................................... 237
7.7 Tor....................................................... 240
7.7.1 Tor Encryption.................................... 243
7.7.2 Examining Tor Traffic............................. 245
7.8 Lab/Tutorial.............................................. 248
References................................................ 249
8 Crypto Cracking 251
8.1 Introduction.............................................. 251
8.2 Key Escrow................................................ 251
8.3 Cracking the Code ........................................ 254
8.4 RSA Cracking.............................................. 258
8.4.1 RSA Crack with Different e Value.................. 258
8.4.2 Cracking RSA by Factorizing N..................... 261
8.4.3 When Me Is less than N............................ 262
8.4.4 RSA Crack with Chinese Remainder
Theory (CRT)...................................... 263
8.4.5 Chosen Cipher Attack.............................. 264
8.4.6 Blinding Attack................................... 266
8.4.7 Bleichenbacher’s Attack........................... 269
8.5 AES Cracking.............................................. 271
8.5.1 AES Copy-and-Paste................................ 271
8.5.2 AES (Brute Force)................................. 273
8.5.3 AES Cracking with Non-Random Numbers.............. 274
8.6 Digital Certificate Cracking.............................. 276
8.7 Lab/Tutorial.............................................. 277
References................................................ 278
9 Light-weight Cryptography and Other Methods 279
9.1 Introduction.............................................. 279
9.2 Light-Weight Symmetric Methods............................ 280
9.3 Light-Weight Hashing...................................... 284
9.4 Other Light Weight Ciphers................................ 287
9.5 Secret Shares............................................. 291
9.6 Post Quantum Cryptography................................. 295
9.7 Lab/Tutorial.............................................. 301
References................................................ 301
x Contents
10 Blockchain and Crypto-currency 303
10.1 Introduction............................................ 303
10.2 Bitcoins, Blockchain and Miners..........................304
10.2.1 Bitcoin Transactions............................. 305
10.2.2 Mining Process................................... 308
10.3 Ethereum................................................ 311
10.3.1 Gas.............................................. 312
10.3.2 Practical Implementation of Ethereum............. 312
10.3.3 Smart Contracts.................................. 316
10.4 Lab/Tutorial............................................ 335
References.............................................. 335
11 Zero-knowledge Proof (ZKP) and Privacy Preserving 337
11.1 Introduction........................................... 337
11.2 ZKP: Discrete Logs..................................... 338
11.3 Commutative Encryption................................. 339
11.4 Graphs and Hamiltonian Cycles.......................... 340
11.5 Feige-Fiat-Shamir...................................... 343
11.6 Non-interactive Random Oracle Access
for Zero-knowledge Proof .............................. 345
11.7 A Fair Coin Flip....................................... 347
11.8 ZKP: Paillier.......................................... 349
11.9 Oblivious Transfer (OT) ............................... 350
11.10 Scrambled Circuits..................................... 354
11.11 Millionaire’s Problem.................................. 357
11.12 RAPPOR................................................. 360
11.13 Secure Function Evaluation (SFE)....................... 364
11.14 Secure Remote Password (SRP) Protocol ................. 365
11.15 Lab/Tutorial........................................... 368
Reference.............................................. 368
12 Wireless Cryptography and Stream Ciphers 369
12.1 Introduction............................................ 369
12.2 RC4..................................................... 371
12.3 WEP..................................................... 373
12.4 Wi-fi Standards......................................... 377
12.5 WPA and WPA-2........................................... 379
12.6 WPA-2 Handshaking....................................... 381
12.7 Cracking WPA-2 PSK ..................................... 383
Contents xi
12.8 Stream Ciphers............................................ 385
12.9 A5 Ciphers................................................ 388
12.9.1 Practical Systems.................................. 389
12.9.2 A5/3 390
12.10Lab/tutorial.............................................. 390
References................................................ 390
Appendix A 391
Index 395
About the Author
401
|
any_adam_object | 1 |
author | Buchanan, William 1961- |
author_GND | (DE-588)122678036 |
author_facet | Buchanan, William 1961- |
author_role | aut |
author_sort | Buchanan, William 1961- |
author_variant | w b wb |
building | Verbundindex |
bvnumber | BV044901348 |
classification_rvk | ST 276 |
ctrlnum | (OCoLC)1038774308 (DE-599)BVBBV044901348 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01685nam a2200373 c 4500</leader><controlfield tag="001">BV044901348</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180524 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180412s2017 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8793379102</subfield><subfield code="9">8793379102</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788793379107</subfield><subfield code="9">9788793379107</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1038774308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044901348</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, William</subfield><subfield code="d">1961-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)122678036</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography</subfield><subfield code="c">William J. Buchanan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Gistrup</subfield><subfield code="b">River Publishers</subfield><subfield code="c">cop. 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxi, 402 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">River Publishers series in information science and technology. Security and digital forensics</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030295142</subfield></datafield></record></collection> |
id | DE-604.BV044901348 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:04:16Z |
institution | BVB |
isbn | 8793379102 9788793379107 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030295142 |
oclc_num | 1038774308 |
open_access_boolean | |
owner | DE-739 DE-706 |
owner_facet | DE-739 DE-706 |
physical | xxi, 402 Seiten Illustrationen |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | River Publishers |
record_format | marc |
series2 | River Publishers series in information science and technology. Security and digital forensics |
spelling | Buchanan, William 1961- Verfasser (DE-588)122678036 aut Cryptography William J. Buchanan Gistrup River Publishers cop. 2017 xxi, 402 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier River Publishers series in information science and technology. Security and digital forensics Kryptologie (DE-588)4033329-2 gnd rswk-swf Cryptography Kryptologie (DE-588)4033329-2 s DE-604 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Buchanan, William 1961- Cryptography Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 |
title | Cryptography |
title_auth | Cryptography |
title_exact_search | Cryptography |
title_full | Cryptography William J. Buchanan |
title_fullStr | Cryptography William J. Buchanan |
title_full_unstemmed | Cryptography William J. Buchanan |
title_short | Cryptography |
title_sort | cryptography |
topic | Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=030295142&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT buchananwilliam cryptography |
Es ist kein Print-Exemplar vorhanden.
Inhaltsverzeichnis