Cryptography and network security:
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Gistrup, Denmark
River Publishers
2022
|
Schriftenreihe: | River Publishers series in security and digital forensics
|
Schlagworte: | |
Online-Zugang: | DE-573 EBSCOhost Volltext Taylor & Francis |
Zusammenfassung: | Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory |
Beschreibung: | 1 online resource (xxiii, 297 pages) illustrations |
ISBN: | 9788770224062 8770224064 9781003337768 1003337767 9781000792935 1000792935 9781000796711 100079671X |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049462910 | ||
003 | DE-604 | ||
005 | 20231214 | ||
007 | cr|uuu---uuuuu | ||
008 | 231212s2022 |||| o||u| ||||||eng d | ||
020 | |a 9788770224062 |9 9788770224062 | ||
020 | |a 8770224064 |9 8770224064 | ||
020 | |a 9781003337768 |9 9781003337768 | ||
020 | |a 1003337767 |9 1003337767 | ||
020 | |a 9781000792935 |9 9781000792935 | ||
020 | |a 1000792935 |9 1000792935 | ||
020 | |a 9781000796711 |9 9781000796711 | ||
020 | |a 100079671X |9 100079671X | ||
024 | 7 | |a 10.1201/9781003337768 |2 doi | |
035 | |a (OCoLC)1414557902 | ||
035 | |a (DE-599)BVBBV049462910 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 | ||
100 | 1 | |a Alencar, Marcelos S. |d 1957- |e Verfasser |0 (DE-588)1146738382 |4 aut | |
245 | 1 | 0 | |a Cryptography and network security |c Marcelo Sampaio de Alencar |
264 | 1 | |a Gistrup, Denmark |b River Publishers |c 2022 | |
264 | 2 | |a Abingdon, Oxon ; New York, NY |b Routledge |c 2022 | |
300 | |a 1 online resource (xxiii, 297 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a River Publishers series in security and digital forensics | |
505 | 8 | |a Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35 | |
505 | 8 | |a 2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless | |
505 | 8 | |a Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1, | |
505 | 8 | |a and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use | |
505 | 8 | |a TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change, | |
505 | 8 | |a Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186 | |
505 | 8 | |a 9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackers⁰́₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home Depot⁰́₉s System 208 12.3.5 Largest Theft of Customer Data 208 | |
505 | 8 | |a 12.3.6 Yahoo Data Breach 209 12.3.7 Customer⁰́₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal, | |
505 | 8 | |a and Netflix 211 12.3.14 MafiaBoy⁰́₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 Bayes⁰́₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function | |
505 | 8 | |a 228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295 | |
520 | 3 | |a Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory | |
653 | 0 | |a Data encryption (Computer science) | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Cryptography | |
653 | 0 | |a Chiffrement (Informatique) | |
653 | 0 | |a Réseaux d'ordinateurs / Sécurité / Mesures | |
653 | 0 | |a Cryptographie | |
653 | 0 | |a COMPUTERS / Cryptography | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Cryptography | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-87-7022-407-9 |
856 | 4 | 0 | |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3455260 |3 EBSCOhost |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/book/9761048 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
856 | 4 | 0 | |u https://www.taylorfrancis.com/books/9781003337768 |3 Taylor & Francis |
912 | |a ZDB-37-RPEB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-034808615 | |
966 | e | |u https://ieeexplore.ieee.org/book/9761048 |l DE-573 |p ZDB-37-RPEB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1806051807501221888 |
---|---|
adam_text | |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Alencar, Marcelos S. 1957- |
author_GND | (DE-588)1146738382 |
author_facet | Alencar, Marcelos S. 1957- |
author_role | aut |
author_sort | Alencar, Marcelos S. 1957- |
author_variant | m s a ms msa |
building | Verbundindex |
bvnumber | BV049462910 |
collection | ZDB-37-RPEB |
contents | Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35 2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1, and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change, Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186 9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackers⁰́₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home Depot⁰́₉s System 208 12.3.5 Largest Theft of Customer Data 208 12.3.6 Yahoo Data Breach 209 12.3.7 Customer⁰́₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal, and Netflix 211 12.3.14 MafiaBoy⁰́₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 Bayes⁰́₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function 228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295 |
ctrlnum | (OCoLC)1414557902 (DE-599)BVBBV049462910 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049462910</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20231214</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">231212s2022 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788770224062</subfield><subfield code="9">9788770224062</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8770224064</subfield><subfield code="9">8770224064</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003337768</subfield><subfield code="9">9781003337768</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003337767</subfield><subfield code="9">1003337767</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000792935</subfield><subfield code="9">9781000792935</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000792935</subfield><subfield code="9">1000792935</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000796711</subfield><subfield code="9">9781000796711</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">100079671X</subfield><subfield code="9">100079671X</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003337768</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1414557902</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049462910</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alencar, Marcelos S.</subfield><subfield code="d">1957-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1146738382</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography and network security</subfield><subfield code="c">Marcelo Sampaio de Alencar</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Gistrup, Denmark</subfield><subfield code="b">River Publishers</subfield><subfield code="c">2022</subfield></datafield><datafield tag="264" ind1=" " ind2="2"><subfield code="a">Abingdon, Oxon ; New York, NY</subfield><subfield code="b">Routledge</subfield><subfield code="c">2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxiii, 297 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">River Publishers series in security and digital forensics</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1,</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change,</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackers⁰́₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home Depot⁰́₉s System 208 12.3.5 Largest Theft of Customer Data 208</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">12.3.6 Yahoo Data Breach 209 12.3.7 Customer⁰́₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal,</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">and Netflix 211 12.3.14 MafiaBoy⁰́₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 Bayes⁰́₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Réseaux d'ordinateurs / Sécurité / Mesures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptographie</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">COMPUTERS / Cryptography</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cryptography</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-87-7022-407-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3455260</subfield><subfield code="3">EBSCOhost</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/book/9761048</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.taylorfrancis.com/books/9781003337768</subfield><subfield code="3">Taylor & Francis</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-37-RPEB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-034808615</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ieeexplore.ieee.org/book/9761048</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-37-RPEB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049462910 |
illustrated | Illustrated |
index_date | 2024-07-03T23:15:10Z |
indexdate | 2024-07-31T00:20:22Z |
institution | BVB |
isbn | 9788770224062 8770224064 9781003337768 1003337767 9781000792935 1000792935 9781000796711 100079671X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-034808615 |
oclc_num | 1414557902 |
open_access_boolean | |
owner | DE-573 |
owner_facet | DE-573 |
physical | 1 online resource (xxiii, 297 pages) illustrations |
psigel | ZDB-37-RPEB |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | River Publishers |
record_format | marc |
series2 | River Publishers series in security and digital forensics |
spelling | Alencar, Marcelos S. 1957- Verfasser (DE-588)1146738382 aut Cryptography and network security Marcelo Sampaio de Alencar Gistrup, Denmark River Publishers 2022 Abingdon, Oxon ; New York, NY Routledge 2022 1 online resource (xxiii, 297 pages) illustrations txt rdacontent c rdamedia cr rdacarrier River Publishers series in security and digital forensics Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35 2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1, and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change, Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186 9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackers⁰́₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home Depot⁰́₉s System 208 12.3.5 Largest Theft of Customer Data 208 12.3.6 Yahoo Data Breach 209 12.3.7 Customer⁰́₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal, and Netflix 211 12.3.14 MafiaBoy⁰́₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 Bayes⁰́₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function 228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295 Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security. Next, the basics of information theory, how to measure information, the information associated with a certain source are also discussed. Source codes are presented, along with the concepts of information transmission, joint information, conditional entropy, mutual information and channel capacity. Computer networks are discussed, including the main protocols and network architectures, and the important TCP/IP protocol. Network security, a topic intrinsically connected to computer networks and the Internet, is presented, along with information about basic hacker attacks, alternatives to prevent attacks, data protection and secure protocols. The information theoretical aspects of cryptography are described including the hash function. An appendix includes a review of probability theory. Illustrations and graphics will help the reader understand the theory Data encryption (Computer science) Computer networks / Security measures Cryptography Chiffrement (Informatique) Réseaux d'ordinateurs / Sécurité / Mesures Cryptographie COMPUTERS / Cryptography Erscheint auch als Druck-Ausgabe 978-87-7022-407-9 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3455260 EBSCOhost https://ieeexplore.ieee.org/book/9761048 Aggregator URL des Erstveröffentlichers Volltext https://www.taylorfrancis.com/books/9781003337768 Taylor & Francis |
spellingShingle | Alencar, Marcelos S. 1957- Cryptography and network security Preface xv Acknowledgements xvii List of Figures xix List of Tables xxiii 1 Introduction 1 1.1 Information on the Network 3 1.2 The Internet of Things 4 1.3 Network Security 6 1.4 Network Encryption 7 1.5 Electronic Voting 8 1.6 Security with Biometrics 10 1.7 How to Understand Recognition 12 1.8 Blockchain and Cryptocurrency 13 1.8.1 Enterprises Can Profit from Blockchain 13 1.8.2 The Cryptocurrency Frenzy 14 2 Main Definitions 19 2.1 Criteria for a Security System 19 2.2 Security Aspects to Consider 20 2.3 Malicious Codes 22 2.3.1 Virus 23 2.3.2 Worms 24 2.3.3 Robots 25 2.3.4 Spy Programs 26 2.3.5 Backdoor Program 27 2.3.6 Trojan Horse 27 2.3.7 Rootkit 28 2.4 Internet Scams 29 2.4.1 Identity Theft 30 2.4.2 Resource Anticipation Fraud 30 2.4.3 Phishing 30 2.4.4 Pharming 31 2.4.5 E-commerce Scams 31 2.4.6 Hoax 32 2.5 Internet Attacks 33 2.5.1 Vulnerability Exploitation 34 2.5.2 Network Scan 34 2.5.3 Fake E-mail Address 34 2.5.4 Traffic Interception 35 2.5.5 Brute Force Attack 35 2.5.6 Page Defacement 36 2.5.7 Denial of Service 36 2.6 Cryptography 37 2.6.1 Symmetric Key and Asymmetric Key Cryptography 37 2.6.2 Hash Function 38 2.6.3 Digital Signature 39 2.6.4 Digital Certificate 39 2.6.5 Cryptography Programs 41 3 Information Theory 43 3.1 Information Measurement 45 3.2 Requirements for an Information Metric 46 3.3 Source Coding 52 3.4 Extension of a Memoryless Discrete Source 54 3.4.1 Improving the Coding Efficiency 54 3.5 Prefix Codes 55 3.6 The Information Unit 58 4 Source Coding 61 4.1 Types of Source Codes 61 4.1.1 Block Codes 61 4.1.2 Non-Singular Codes 61 4.1.3 Uniquely Decodable Codes 62 4.1.4 Instantaneous Codes 63 4.2 Construction of Instantaneous Codes 65 4.3 Kraft Inequality 67 4.4 Huffman Code 69 4.4.1 Constructing a Binary Huffman Code 70 5 Information Transmission and Channel Capacity 75 5.1 The Concept of Information Theory 76 5.2 Joint Information Measurement 76 5.3 Conditional Entropy 78 5.4 Model for a Communication Channel 79 5.5 Noiseless Channel 80 5.6 Channel with Independent Output and Input 80 5.7 Relations Between the Entropies 81 5.8 Mutual Information 82 5.9 Channel Capacity 84 5.9.1 Capacity of the Memoryless Discrete Channel 85 5.9.2 Relative Redundancy and Efficiency 85 6 Computer Networks 91 6.1 Data Flow in Networks 92 6.1.1 Capacity of a Channel Composition 92 6.1.2 Stationary Data Flow 96 6.2 Queue Models 99 6.2.1 Markov Model 101 6.2.2 Solution for a Stable Network 103 6.2.3 Constant Arrival Rate System 104 6.2.4 Efficient Server Model 107 6.2.5 Model with Discouraged Arrivals 108 6.2.6 Models of Queues M/G/1, M/M/1, and M/D/1 109 6.3 Local Area Networks 112 6.3.1 Definitions and Functions 112 6.3.2 Applications for Local Area Networks 113 6.3.3 Network Structure and Topology 113 6.3.4 Channel Access Techniques 116 6.3.5 Traffic on the Network 117 6.3.6 Performance Measures 118 7 Network Protocols and Architecture 123 7.1 What the World Was Like Without the Internet 123 7.2 Layer Architecture 127 7.2.1 The ISO Reference Model 129 7.2.2 Reference Model layers 129 7.2.3 IEEE 802 Standards for Computer Networks 133 8 The TCP/IP Protocol 135 8.1 TCP/IP Protocol History 135 8.2 Internet Coordination 136 8.3 Types of Networks 137 8.4 Transmission Protocols 137 8.5 Interconnection Equipment 138 8.6 Interconnection Protocols 138 8.6.1 Other TCP Services 139 8.6.2 TCP Header Structure 140 8.7 The IP Protocol 141 8.7.1 IP Addresses 141 8.7.2 Example of a DNS 142 8.7.3 Datagram Fragmentation 142 8.7.4 IP Routing 143 8.7.5 IP Address Resolution 144 8.7.6 User Datagram Protocol 146 8.7.7 Applications that Use TCP and UDP 146 8.7.8 Applications that Use TCP and UDP 147 8.8 The TCP/IP Protocol 147 8.8.1 Application Layer 148 8.8.2 Transport Layer 149 8.8.3 Internet Layer 151 8.9 Security Protocols for TCP/IP 153 8.9.1 IP Security Protocol 154 8.9.2 Vulnerabilities and Precautions Regarding TCP/IP 155 8.9.3 Vulnerabilities and Precautions Regarding TCP/IP Services 156 9 Network Security 159 9.1 Cryptography Applied to Computer Networks 159 9.1.1 Potential Network Vulnerabilities 160 9.1.2 Listening, Data Change, Forged Identity 160 9.1.3 Password-Based Attacks 161 9.1.4 Denial of Service 161 9.1.5 Password Break Attack 162 9.1.6 Sniffer Attack 162 9.1.7 Attack to the Application Layer 163 9.2 Alternatives to Prevent Attacks 163 9.2.1 Security Technologies 164 9.2.2 Security Mechanisms for the Application Layer 164 9.2.3 Security Mechanisms for the Transport Layer 165 9.2.4 Security Mechanisms for the Network Layer 165 9.3 Secure Sockets Layer Protocol 166 9.3.1 Encryption Used with SSL 168 9.4 Exchange of Information for the Safe Sockets Layer 169 9.4.1 Server Authentication 171 9.4.2 Attack of the Man in the Middle 173 9.4.3 Client Authentication 173 9.5 Data Protection with IPsec 175 9.5.1 Security Associations 176 9.5.2 Tunneling 178 9.5.3 Authentication Header 179 9.5.4 Authentication Header Format 179 9.5.5 Authentication Header in Transport and Tunnel Modes 182 9.5.6 AH in Tunnel Mode 182 9.6 Encapsulated Security Load 184 9.6.1 ESP Package Format 184 9.6.2 ESP in Transport Mode 186 9.6.3 ESP in Tunnel Mode 186 9.7 Espionage Between Countries 186 10 Theoretical Cryptography 189 10.1 Introduction 189 10.2 Cryptographic Aspects of Computer Networks 190 10.2.1 Potential Vulnerabilities of Computer Networks 190 10.3 Principles of Cryptography 191 10.4 Information Theoretical Aspects of Cryptography 192 10.4.1 Relations Between the Entropies 194 10.5 Mutual Information for Cryptosystems 195 11 The Hash Function 197 11.1 Introduction to Network Security 197 11.2 Hash Functions 198 11.3 Objectives of the Hash Function 199 11.4 Mathematical Preliminaries 201 11.5 Privacy Amplification 202 11.6 Conclusion 204 12 Criminal Cases 205 12.1 Introduction to Cybercrimes 205 12.2 Types of Cybercrimes 205 12.3 Famous Cybercrimes 206 12.3.1 The Mythical Pegasus 207 12.3.2 Hackers⁰́₉ Attack to Colonial and JBS 207 12.3.3 The Biggest Ransomware Attack Ever 208 12.3.4 Credit Cards Data Stolen from Home Depot⁰́₉s System 208 12.3.5 Largest Theft of Customer Data 208 12.3.6 Yahoo Data Breach 209 12.3.7 Customer⁰́₉s Data Stolen from Healthcare Companies 209 12.3.8 Social Security Numbers Stolen from IRS 209 12.3.9 Government Data Breach Due to Outdated Technology 210 12.3.10 Google Corporate Servers Hacked in China 210 12.3.11 Sony Pictures Hacked 210 12.3.12 Wikileaks Obtained Sensitive Information from the Democratic National Committee 211 12.3.13 A DDoS Attack that Took Down Twitter, PayPal, and Netflix 211 12.3.14 MafiaBoy⁰́₉s Teenage Crimes 211 12.3.15 Epsilon Attacked by Hackers 212 12.3.16 NHS Patients Had Their Computers Infected 212 12.3.17 When the United States Department of Defense was Attacked 213 12.3.18 The Ashley Madison Hack 213 12.3.19 The Stuxnet Worm Attack 213 12.3.20 The Iceman Attack 214 12.3.21 Bitcoin Stolen from Bitfinex Exchange in Hong Kong 214 12.3.22 Crypto Exchange Bithumb Hacked 214 12.3.23 Espionage Between Partners 215 Appendix A Probability Theory 217 A.1 Set Theory and Measure 217 A.1.1 Basic Set Theory 218 A.1.2 Some Operations on Sets 219 A.1.3 Families of Sets 220 A.1.4 Indexing of Sets 221 A.1.5 An Algebra of Sets 222 A.1.6 The Borel Algebra 223 A.2 Basic Probability Theory 223 A.2.1 The Axioms of Probability 224 A.2.2 Bayes⁰́₉ Rule 225 A.3 Random Variables 226 A.3.1 Expected Value of a Random Variable 227 A.3.2 Moments of a Random Variable 227 A.3.3 Variance of a Random Variable 228 A.3.4 Characteristic Function 228 A.3.4.1 Two Important Distributions 228 A.3.5 Joint Random Variables 229 Appendix B Cryptoalgorithms and Cryptosystems 233 Appendix C Glossary of Information Security Terms 247 References 269 Index 277 About the Author 295 |
title | Cryptography and network security |
title_auth | Cryptography and network security |
title_exact_search | Cryptography and network security |
title_exact_search_txtP | Cryptography and network security |
title_full | Cryptography and network security Marcelo Sampaio de Alencar |
title_fullStr | Cryptography and network security Marcelo Sampaio de Alencar |
title_full_unstemmed | Cryptography and network security Marcelo Sampaio de Alencar |
title_short | Cryptography and network security |
title_sort | cryptography and network security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=3455260 https://ieeexplore.ieee.org/book/9761048 https://www.taylorfrancis.com/books/9781003337768 |
work_keys_str_mv | AT alencarmarceloss cryptographyandnetworksecurity |