Cryptography /:
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Gistrup, Denmark :
River Publishers,
[2017]
|
Schriftenreihe: | River Publishers series in information science and technology.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | 1 online resource |
ISBN: | 9788793609143 8793609140 8793379102 9788793379107 9781003337751 1003337759 9781000792126 1000792129 9781000795349 1000795349 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1048393652 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 170930s2017 dk o 000 0 eng | ||
040 | |a AU@ |b eng |e pn |c AU@ |d OCLCO |d OCLCF |d INT |d N$T |d CEF |d OCLCQ |d UKAHL |d VT2 |d K6U |d OCLCQ |d OCLCO |d UPM |d TYFRS |d OCLCQ |d OCLCO | ||
019 | |a 1138970151 | ||
020 | |a 9788793609143 |q (electronic bk.) | ||
020 | |a 8793609140 |q (electronic bk.) | ||
020 | |a 8793379102 | ||
020 | |a 9788793379107 | ||
020 | |a 9781003337751 |q (electronic bk.) | ||
020 | |a 1003337759 |q (electronic bk.) | ||
020 | |a 9781000792126 |q (electronic bk. : EPUB) | ||
020 | |a 1000792129 |q (electronic bk. : EPUB) | ||
020 | |a 9781000795349 |q (electronic bk. : PDF) | ||
020 | |a 1000795349 |q (electronic bk. : PDF) | ||
024 | 3 | |a 9788793379107 | |
024 | 7 | |a 10.1201/9781003337751 |2 doi | |
035 | |a (OCoLC)1048393652 |z (OCoLC)1138970151 | ||
037 | |b 01800237 | ||
037 | |a 9781003337751 |b Taylor & Francis | ||
050 | 4 | |a QA76.9.A25 |b B83 2017 | |
072 | 7 | |a COM |x 083000 |2 bisacsh | |
072 | 7 | |a SCI |x 024000 |2 bisacsh | |
072 | 7 | |a GPJ |2 bicssc | |
082 | 7 | |a 005.8/24 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Buchanan, William J., |e author. | |
245 | 1 | 0 | |a Cryptography / |c William J. Buchanan, OBE. |
264 | 1 | |a Gistrup, Denmark : |b River Publishers, |c [2017] | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a River Publishers series in information science and technology. | |
588 | 0 | |a Online resource; title from digital title page (viewed on November 09, 2017). | |
505 | 0 | 0 | |g Machine generated contents note: |g 1.1. |t Introduction -- |g 1.2. |t Simple Cipher Methods -- |g 1.2.1. |t Morse Code -- |g 1.2.2. |t Pigpen -- |g 1.2.3. |t Rail Code -- |g 1.2.4. |t BIFID Cipher -- |g 1.2.5. |t Playfair -- |g 1.2.6. |t Homophonic Substitution Code -- |g 1.2.7. |t Caesar Coding and Scrambled Alphabet -- |g 1.2.8. |t Vigenere Cipher -- |g 1.2.9. |t One-Time Pad (OTP) -- |g 1.3. |t Encoding Methods -- |g 1.3.1. |t Hexadecimal and Base-64 -- |g 1.4. |t Huffman Coding and Lempel-Viz Welsh (LZW) -- |g 1.5. |t Data Integrity (CRC-32) -- |g 1.6. |t Little Endian or Big Endian -- |g 1.7. |t Introduction to Probability and Number Theory -- |g 1.7.1. |t Combinations and Permutations -- |g 1.7.2. |t Probability Theory -- |g 1.7.3. |t Set Theory -- |g 1.7.4. |t Number Representations -- |g 1.7.5. |t Logarithms -- |g 1.8. |t Prime Numbers -- |g 1.9. |t Encryption Operators (mod, EX-OR and shift) -- |g 1.9.1. |t Mod Operator -- |g 1.9.2. |t Shift-Operators -- |g 1.9.3. |t Integers and Big Integers -- |g 1.9.4. |t X-OR -- |g 1.9.5. |t Modulo-2 Operations -- |g 1.10. |t GCD -- |g 1.11. |t Random Number Generators -- |g 1.11.1. |t Linear Congruential Random Numbers -- |g 1.12. |t Frequency Analysis -- |g 1.13. |t Lab/tutorial -- |g 2.1. |t Introduction -- |g 2.1.1. |t Early Days -- |g 2.1.2. |t Encryption -- |g 2.1.3. |t Secure Communications -- |g 2.1.4. |t Modern Methods -- |g 2.2. |t Key-based Cryptography -- |g 2.2.1. |t Computation Difficulty -- |g 2.2.2. |t Stream Encryption and Block Encryption -- |g 2.2.3. |t Padding -- |g 2.3. |t Brute-Force Analysis -- |g 2.4. |t Adding Salt -- |g 2.4.1. |t Cipher Block Chaining CBC -- |g 2.4.2. |t Cipher Feedback (CFB) -- |g 2.4.3. |t Output Feedback (OFB) -- |g 2.4.4. |t Counter Mode -- |g 2.4.5. |t CBC Example -- |g 2.5. |t AES -- |g 2.5.1. |t Substitution Bytes (S-box) -- |g 2.5.2. |t Shift Row Transformation -- |g 2.5.3. |t Mix Column Transformation -- |g 2.5.4. |t Add Round Key Transformation -- |g 2.6. |t Secret-Key Encryption -- |g 2.6.1. |t DES/3-DES -- |g 2.6.2. |t RC4 -- |g 2.6.3. |t AES/Rijndael -- |g 2.6.4. |t IDEA -- |g 2.6.5. |t RC5 -- |g 2.6.6. |t Skipjack -- |g 2.6.7. |t Blowfish -- |g 2.6.8. |t Twofish -- |g 2.6.9. |t Camellia -- |g 2.6.10. |t XTEA -- |g 2.7. |t Key Entropy -- |g 2.8. |t OpenSSL -- |g 2.9. |t Pohlog-Hellman -- |g 2.10. |t Lab/tutorial -- |g 3.1. |t Introduction -- |g 3.2. |t Hashing Methods -- |g 3.3. |t Problems with Hashes -- |g 3.3.1. |t Hash Cracking -- |g 3.4. |t Salting the Hash Value -- |g 3.5. |t Common Hashing Methods -- |g 3.5.1. |t LM Hashing -- |g 3.5.2. |t APR1 (MD5 with Salt) -- |g 3.5.3. |t SHA 1, SHA256 and SHA512 -- |g 3.5.4. |t PHPass -- |g 3.5.5. |t Non-Cryptographic Hashes -- |g 3.6. |t Authenticating the Sender -- |g 3.7. |t HMAC (Hash Message Authentication Code) -- |g 3.8. |t Password Hashing -- |g 3.9. |t Password Cracking -- |g 3.10. |t One Time Passwords -- |g 3.11. |t Time Stamp Protocol -- |g 3.12. |t Winnowing and Chaffing -- |g 3.13. |t SHA-3 -- |g 3.14. |t Lab/Tutorial -- |t References -- |g 4.1. |t Introduction -- |g 4.2. |t RSA -- |g 4.3. |t Elliptic Curve Ciphers (ECC) -- |g 4.4. |t ElGamal -- |g 4.5. |t Cramer-Shoup -- |g 4.6. |t Paillier Cryptosystem -- |g 4.7. |t Knapsack Encryption -- |g 4.8. |t Identity-Based Encryption -- |g 4.9. |t Lab/Tutorial -- |t Reference -- |g 5.1. |t Introduction -- |g 5.2. |t Diffie-Hellman Key Exchange -- |g 5.3. |t Creating the Generator -- |g 5.4. |t Diffie-Hellman Examples -- |g 5.5. |t Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- |g 5.6. |t (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- |g 5.7. |t Diffie-Hellman Weaknesses -- |g 5.8. |t Using the Public Key to Pass a Secret Key -- |g 5.9. |t Lab/Tutorial -- |g 6.1. |t Introduction -- |g 6.2. |t Methods of Authentication -- |g 6.3. |t Digital Certificates and PKI -- |g 6.3.1. |t PM and Trust -- |g 6.3.2. |t Digital Certificate Types -- |g 6.3.3. |t Digital Certificate Reader -- |g 6.4. |t Key and Certificate Management -- |g 6.5. |t Creating a Signed Certificate -- |g 6.6. |t Digital Certificate Passing -- |g 6.7. |t Email Encryption -- |g 6.8. |t Kerberos -- |g 6.9. |t Kerberos Key Sharing -- |g 6.10. |t Lab/Tutorial -- |g 7.1. |t Introduction -- |g 7.2. |t SSL/TLS Connections -- |g 7.3. |t SSUFLS Handshaking -- |g 7.4. |t SSL Risks -- |g 7.5. |t VPN Tunnels -- |g 7.6. |t IKE -- |g 7.6.1. |t Phase 1 -- |g 7.6.2. |t Phase 2 -- |g 7.7. |t Tor -- |g 7.7.1. |t Tor Encryption -- |g 7.7.2. |t Examining Tor Traffic -- |g 7.8. |t Lab/Tutorial -- |t References -- |g 8.1. |t Introduction -- |g 8.2. |t Key Escrow -- |g 8.3. |t Cracking the Code -- |g 8.4. |t RSA Cracking -- |g 8.4.1. |t RSA Crack with Different e Value -- |g 8.4.2. |t Cracking RSA by Factorizing N -- |g 8.4.3. |t When Me Is less than N -- |g 8.4.4. |t RSA Crack with Chinese Remainder Theory (CRT) -- |g 8.4.5. |t Chosen Cipher Attack -- |g 8.4.6. |t Blinding Attack -- |g 8.4.7. |t Bleichenbacher's Attack -- |g 8.5. |t AES Cracking -- |g 8.5.1. |t AES Copy-and-Paste -- |g 8.5.2. |t AES (Brute Force) -- |g 8.5.3. |t AES Cracking with Non-Random Numbers -- |g 8.6. |t Digital Certificate Cracking -- |g 8.7. |t Lab/Tutorial -- |t References -- |g 9.1. |t Introduction -- |g 9.2. |t Light-Weight Symmetric Methods -- |g 9.3. |t Light-Weight Hashing -- |g 9.4. |t Other Light Weight Ciphers -- |g 9.5. |t Secret Shares -- |g 9.6. |t Post Quantum Cryptography -- |g 9.7. |t Lab/Tutorial -- |t References -- |g 10.1. |t Introduction -- |g 10.2. |t Bitcoins, Blockchain and Miners -- |g 10.2.1. |t Bitcoin Transactions -- |g 10.2.2. |t Mining Process -- |g 10.3. |t Ethereum -- |g 10.3.1. |t Gas -- |g 10.3.2. |t Practical Implementation of Ethereum -- |g 10.3.3. |t Smart Contracts -- |g 10.4. |t Lab/Tutorial -- |t References -- |g 11.1. |t Introduction -- |g 11.2. |t ZKP: Discrete Logs -- |g 11.3. |t Commutative Encryption -- |g 11.4. |t Graphs and Hamiltonian Cycles -- |g 11.5. |t Feige-Fiat-Shamir -- |g 11.6. |t Non-interactive Random Oracle Access for Zero-knowledge Proof -- |g 11.7. |t Fair Coin Flip -- |g 11.8. |t ZKP: Paillier -- |g 11.9. |t Oblivious Transfer (OT) -- |g 11.10. |t Scrambled Circuits -- |g 11.11. |t Millionaire's Problem -- |g 11.12. |t RAPPOR -- |g 11.13. |t Secure Function Evaluation (SFE) -- |g 11.14. |t Secure Remote Password (SRP) Protocol -- |g 11.15. |t Lab/Tutorial -- |t Reference -- |g 12.1. |t Introduction -- |g 12.2. |t RC4 -- |g 12.3. |t WEP -- |g 12.4. |t Wi-fi Standards -- |g 12.5. |t WPA and WPA-2 -- |g 12.6. |t WPA-2 Handshaking -- |g 12.7. |t Cracking WPA-2 PSK -- |g 12.8. |t Stream Ciphers -- |g 12.9. |t A5 Ciphers -- |g 12.9.1. |t Practical Systems -- |g 12.9.2. |t A5/3 -- |g 12.10. |t Lab/tutorial -- |t References. |
588 | 0 | |a Print version record. | |
520 | 8 | |a Annotation |b Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs. Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs. This book provides extensive support through the associated website of: http: //asecuritysite.com/encryption. | |
545 | 0 | |a William Buchanan | |
650 | 0 | |a Data encryption (Computer science) |0 http://id.loc.gov/authorities/subjects/sh94001524 | |
650 | 6 | |a Chiffrement (Informatique) | |
650 | 7 | |a COMPUTERS |x Security |x Cryptography. |2 bisacsh | |
650 | 7 | |a SCIENCE / Energy |2 bisacsh | |
650 | 7 | |a Data encryption (Computer science) |2 fast | |
776 | 0 | 8 | |i Print version: |a Buchanan, William J. |t Cryptography. |d Gistrup, Denmark : River Publishers, [2017] |z 9788793609143 |
830 | 0 | |a River Publishers series in information science and technology. |0 http://id.loc.gov/authorities/names/no2015084441 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800585 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH40583797 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH34298003 | ||
938 | |a EBSCOhost |b EBSC |n 1800585 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1048393652 |
---|---|
_version_ | 1816882467975462912 |
adam_text | |
any_adam_object | |
author | Buchanan, William J. |
author_facet | Buchanan, William J. |
author_role | aut |
author_sort | Buchanan, William J. |
author_variant | w j b wj wjb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B83 2017 |
callnumber-search | QA76.9.A25 B83 2017 |
callnumber-sort | QA 276.9 A25 B83 42017 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction -- Simple Cipher Methods -- Morse Code -- Pigpen -- Rail Code -- BIFID Cipher -- Playfair -- Homophonic Substitution Code -- Caesar Coding and Scrambled Alphabet -- Vigenere Cipher -- One-Time Pad (OTP) -- Encoding Methods -- Hexadecimal and Base-64 -- Huffman Coding and Lempel-Viz Welsh (LZW) -- Data Integrity (CRC-32) -- Little Endian or Big Endian -- Introduction to Probability and Number Theory -- Combinations and Permutations -- Probability Theory -- Set Theory -- Number Representations -- Logarithms -- Prime Numbers -- Encryption Operators (mod, EX-OR and shift) -- Mod Operator -- Shift-Operators -- Integers and Big Integers -- X-OR -- Modulo-2 Operations -- GCD -- Random Number Generators -- Linear Congruential Random Numbers -- Frequency Analysis -- Lab/tutorial -- Early Days -- Encryption -- Secure Communications -- Modern Methods -- Key-based Cryptography -- Computation Difficulty -- Stream Encryption and Block Encryption -- Padding -- Brute-Force Analysis -- Adding Salt -- Cipher Block Chaining CBC -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode -- CBC Example -- AES -- Substitution Bytes (S-box) -- Shift Row Transformation -- Mix Column Transformation -- Add Round Key Transformation -- Secret-Key Encryption -- DES/3-DES -- RC4 -- AES/Rijndael -- IDEA -- RC5 -- Skipjack -- Blowfish -- Twofish -- Camellia -- XTEA -- Key Entropy -- OpenSSL -- Pohlog-Hellman -- Hashing Methods -- Problems with Hashes -- Hash Cracking -- Salting the Hash Value -- Common Hashing Methods -- LM Hashing -- APR1 (MD5 with Salt) -- SHA 1, SHA256 and SHA512 -- PHPass -- Non-Cryptographic Hashes -- Authenticating the Sender -- HMAC (Hash Message Authentication Code) -- Password Hashing -- Password Cracking -- One Time Passwords -- Time Stamp Protocol -- Winnowing and Chaffing -- SHA-3 -- Lab/Tutorial -- References -- RSA -- Elliptic Curve Ciphers (ECC) -- ElGamal -- Cramer-Shoup -- Paillier Cryptosystem -- Knapsack Encryption -- Identity-Based Encryption -- Reference -- Diffie-Hellman Key Exchange -- Creating the Generator -- Diffie-Hellman Examples -- Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- Diffie-Hellman Weaknesses -- Using the Public Key to Pass a Secret Key -- Methods of Authentication -- Digital Certificates and PKI -- PM and Trust -- Digital Certificate Types -- Digital Certificate Reader -- Key and Certificate Management -- Creating a Signed Certificate -- Digital Certificate Passing -- Email Encryption -- Kerberos -- Kerberos Key Sharing -- SSL/TLS Connections -- SSUFLS Handshaking -- SSL Risks -- VPN Tunnels -- IKE -- Phase 1 -- Phase 2 -- Tor -- Tor Encryption -- Examining Tor Traffic -- Key Escrow -- Cracking the Code -- RSA Cracking -- RSA Crack with Different e Value -- Cracking RSA by Factorizing N -- When Me Is less than N -- RSA Crack with Chinese Remainder Theory (CRT) -- Chosen Cipher Attack -- Blinding Attack -- Bleichenbacher's Attack -- AES Cracking -- AES Copy-and-Paste -- AES (Brute Force) -- AES Cracking with Non-Random Numbers -- Digital Certificate Cracking -- Light-Weight Symmetric Methods -- Light-Weight Hashing -- Other Light Weight Ciphers -- Secret Shares -- Post Quantum Cryptography -- Bitcoins, Blockchain and Miners -- Bitcoin Transactions -- Mining Process -- Ethereum -- Gas -- Practical Implementation of Ethereum -- Smart Contracts -- ZKP: Discrete Logs -- Commutative Encryption -- Graphs and Hamiltonian Cycles -- Feige-Fiat-Shamir -- Non-interactive Random Oracle Access for Zero-knowledge Proof -- Fair Coin Flip -- ZKP: Paillier -- Oblivious Transfer (OT) -- Scrambled Circuits -- Millionaire's Problem -- RAPPOR -- Secure Function Evaluation (SFE) -- Secure Remote Password (SRP) Protocol -- WEP -- Wi-fi Standards -- WPA and WPA-2 -- WPA-2 Handshaking -- Cracking WPA-2 PSK -- Stream Ciphers -- A5 Ciphers -- Practical Systems -- A5/3 -- References. |
ctrlnum | (OCoLC)1048393652 |
dewey-full | 005.8/24 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/24 |
dewey-search | 005.8/24 |
dewey-sort | 15.8 224 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>09718cam a2200673 a 4500</leader><controlfield tag="001">ZDB-4-EBA-on1048393652</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">170930s2017 dk o 000 0 eng </controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">AU@</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">AU@</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">INT</subfield><subfield code="d">N$T</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">VT2</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UPM</subfield><subfield code="d">TYFRS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1138970151</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788793609143</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8793609140</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">8793379102</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9788793379107</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781003337751</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1003337759</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000792126</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000792129</subfield><subfield code="q">(electronic bk. : EPUB)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781000795349</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1000795349</subfield><subfield code="q">(electronic bk. : PDF)</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9788793379107</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1201/9781003337751</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1048393652</subfield><subfield code="z">(OCoLC)1138970151</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="b">01800237</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">9781003337751</subfield><subfield code="b">Taylor & Francis</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B83 2017</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">083000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">SCI</subfield><subfield code="x">024000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">GPJ</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/24</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, William J.,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cryptography /</subfield><subfield code="c">William J. Buchanan, OBE.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Gistrup, Denmark :</subfield><subfield code="b">River Publishers,</subfield><subfield code="c">[2017]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">River Publishers series in information science and technology.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from digital title page (viewed on November 09, 2017).</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="g">Machine generated contents note:</subfield><subfield code="g">1.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">1.2.</subfield><subfield code="t">Simple Cipher Methods --</subfield><subfield code="g">1.2.1.</subfield><subfield code="t">Morse Code --</subfield><subfield code="g">1.2.2.</subfield><subfield code="t">Pigpen --</subfield><subfield code="g">1.2.3.</subfield><subfield code="t">Rail Code --</subfield><subfield code="g">1.2.4.</subfield><subfield code="t">BIFID Cipher --</subfield><subfield code="g">1.2.5.</subfield><subfield code="t">Playfair --</subfield><subfield code="g">1.2.6.</subfield><subfield code="t">Homophonic Substitution Code --</subfield><subfield code="g">1.2.7.</subfield><subfield code="t">Caesar Coding and Scrambled Alphabet --</subfield><subfield code="g">1.2.8.</subfield><subfield code="t">Vigenere Cipher --</subfield><subfield code="g">1.2.9.</subfield><subfield code="t">One-Time Pad (OTP) --</subfield><subfield code="g">1.3.</subfield><subfield code="t">Encoding Methods --</subfield><subfield code="g">1.3.1.</subfield><subfield code="t">Hexadecimal and Base-64 --</subfield><subfield code="g">1.4.</subfield><subfield code="t">Huffman Coding and Lempel-Viz Welsh (LZW) --</subfield><subfield code="g">1.5.</subfield><subfield code="t">Data Integrity (CRC-32) --</subfield><subfield code="g">1.6.</subfield><subfield code="t">Little Endian or Big Endian --</subfield><subfield code="g">1.7.</subfield><subfield code="t">Introduction to Probability and Number Theory --</subfield><subfield code="g">1.7.1.</subfield><subfield code="t">Combinations and Permutations --</subfield><subfield code="g">1.7.2.</subfield><subfield code="t">Probability Theory --</subfield><subfield code="g">1.7.3.</subfield><subfield code="t">Set Theory --</subfield><subfield code="g">1.7.4.</subfield><subfield code="t">Number Representations --</subfield><subfield code="g">1.7.5.</subfield><subfield code="t">Logarithms --</subfield><subfield code="g">1.8.</subfield><subfield code="t">Prime Numbers --</subfield><subfield code="g">1.9.</subfield><subfield code="t">Encryption Operators (mod, EX-OR and shift) --</subfield><subfield code="g">1.9.1.</subfield><subfield code="t">Mod Operator --</subfield><subfield code="g">1.9.2.</subfield><subfield code="t">Shift-Operators --</subfield><subfield code="g">1.9.3.</subfield><subfield code="t">Integers and Big Integers --</subfield><subfield code="g">1.9.4.</subfield><subfield code="t">X-OR --</subfield><subfield code="g">1.9.5.</subfield><subfield code="t">Modulo-2 Operations --</subfield><subfield code="g">1.10.</subfield><subfield code="t">GCD --</subfield><subfield code="g">1.11.</subfield><subfield code="t">Random Number Generators --</subfield><subfield code="g">1.11.1.</subfield><subfield code="t">Linear Congruential Random Numbers --</subfield><subfield code="g">1.12.</subfield><subfield code="t">Frequency Analysis --</subfield><subfield code="g">1.13.</subfield><subfield code="t">Lab/tutorial --</subfield><subfield code="g">2.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">2.1.1.</subfield><subfield code="t">Early Days --</subfield><subfield code="g">2.1.2.</subfield><subfield code="t">Encryption --</subfield><subfield code="g">2.1.3.</subfield><subfield code="t">Secure Communications --</subfield><subfield code="g">2.1.4.</subfield><subfield code="t">Modern Methods --</subfield><subfield code="g">2.2.</subfield><subfield code="t">Key-based Cryptography --</subfield><subfield code="g">2.2.1.</subfield><subfield code="t">Computation Difficulty --</subfield><subfield code="g">2.2.2.</subfield><subfield code="t">Stream Encryption and Block Encryption --</subfield><subfield code="g">2.2.3.</subfield><subfield code="t">Padding --</subfield><subfield code="g">2.3.</subfield><subfield code="t">Brute-Force Analysis --</subfield><subfield code="g">2.4.</subfield><subfield code="t">Adding Salt --</subfield><subfield code="g">2.4.1.</subfield><subfield code="t">Cipher Block Chaining CBC --</subfield><subfield code="g">2.4.2.</subfield><subfield code="t">Cipher Feedback (CFB) --</subfield><subfield code="g">2.4.3.</subfield><subfield code="t">Output Feedback (OFB) --</subfield><subfield code="g">2.4.4.</subfield><subfield code="t">Counter Mode --</subfield><subfield code="g">2.4.5.</subfield><subfield code="t">CBC Example --</subfield><subfield code="g">2.5.</subfield><subfield code="t">AES --</subfield><subfield code="g">2.5.1.</subfield><subfield code="t">Substitution Bytes (S-box) --</subfield><subfield code="g">2.5.2.</subfield><subfield code="t">Shift Row Transformation --</subfield><subfield code="g">2.5.3.</subfield><subfield code="t">Mix Column Transformation --</subfield><subfield code="g">2.5.4.</subfield><subfield code="t">Add Round Key Transformation --</subfield><subfield code="g">2.6.</subfield><subfield code="t">Secret-Key Encryption --</subfield><subfield code="g">2.6.1.</subfield><subfield code="t">DES/3-DES --</subfield><subfield code="g">2.6.2.</subfield><subfield code="t">RC4 --</subfield><subfield code="g">2.6.3.</subfield><subfield code="t">AES/Rijndael --</subfield><subfield code="g">2.6.4.</subfield><subfield code="t">IDEA --</subfield><subfield code="g">2.6.5.</subfield><subfield code="t">RC5 --</subfield><subfield code="g">2.6.6.</subfield><subfield code="t">Skipjack --</subfield><subfield code="g">2.6.7.</subfield><subfield code="t">Blowfish --</subfield><subfield code="g">2.6.8.</subfield><subfield code="t">Twofish --</subfield><subfield code="g">2.6.9.</subfield><subfield code="t">Camellia --</subfield><subfield code="g">2.6.10.</subfield><subfield code="t">XTEA --</subfield><subfield code="g">2.7.</subfield><subfield code="t">Key Entropy --</subfield><subfield code="g">2.8.</subfield><subfield code="t">OpenSSL --</subfield><subfield code="g">2.9.</subfield><subfield code="t">Pohlog-Hellman --</subfield><subfield code="g">2.10.</subfield><subfield code="t">Lab/tutorial --</subfield><subfield code="g">3.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">3.2.</subfield><subfield code="t">Hashing Methods --</subfield><subfield code="g">3.3.</subfield><subfield code="t">Problems with Hashes --</subfield><subfield code="g">3.3.1.</subfield><subfield code="t">Hash Cracking --</subfield><subfield code="g">3.4.</subfield><subfield code="t">Salting the Hash Value --</subfield><subfield code="g">3.5.</subfield><subfield code="t">Common Hashing Methods --</subfield><subfield code="g">3.5.1.</subfield><subfield code="t">LM Hashing --</subfield><subfield code="g">3.5.2.</subfield><subfield code="t">APR1 (MD5 with Salt) --</subfield><subfield code="g">3.5.3.</subfield><subfield code="t">SHA 1, SHA256 and SHA512 --</subfield><subfield code="g">3.5.4.</subfield><subfield code="t">PHPass --</subfield><subfield code="g">3.5.5.</subfield><subfield code="t">Non-Cryptographic Hashes --</subfield><subfield code="g">3.6.</subfield><subfield code="t">Authenticating the Sender --</subfield><subfield code="g">3.7.</subfield><subfield code="t">HMAC (Hash Message Authentication Code) --</subfield><subfield code="g">3.8.</subfield><subfield code="t">Password Hashing --</subfield><subfield code="g">3.9.</subfield><subfield code="t">Password Cracking --</subfield><subfield code="g">3.10.</subfield><subfield code="t">One Time Passwords --</subfield><subfield code="g">3.11.</subfield><subfield code="t">Time Stamp Protocol --</subfield><subfield code="g">3.12.</subfield><subfield code="t">Winnowing and Chaffing --</subfield><subfield code="g">3.13.</subfield><subfield code="t">SHA-3 --</subfield><subfield code="g">3.14.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">References --</subfield><subfield code="g">4.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">4.2.</subfield><subfield code="t">RSA --</subfield><subfield code="g">4.3.</subfield><subfield code="t">Elliptic Curve Ciphers (ECC) --</subfield><subfield code="g">4.4.</subfield><subfield code="t">ElGamal --</subfield><subfield code="g">4.5.</subfield><subfield code="t">Cramer-Shoup --</subfield><subfield code="g">4.6.</subfield><subfield code="t">Paillier Cryptosystem --</subfield><subfield code="g">4.7.</subfield><subfield code="t">Knapsack Encryption --</subfield><subfield code="g">4.8.</subfield><subfield code="t">Identity-Based Encryption --</subfield><subfield code="g">4.9.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">Reference --</subfield><subfield code="g">5.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">5.2.</subfield><subfield code="t">Diffie-Hellman Key Exchange --</subfield><subfield code="g">5.3.</subfield><subfield code="t">Creating the Generator --</subfield><subfield code="g">5.4.</subfield><subfield code="t">Diffie-Hellman Examples --</subfield><subfield code="g">5.5.</subfield><subfield code="t">Ephemeral Diffie-Hellman with RSA (DHE-RSA) --</subfield><subfield code="g">5.6.</subfield><subfield code="t">(Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) --</subfield><subfield code="g">5.7.</subfield><subfield code="t">Diffie-Hellman Weaknesses --</subfield><subfield code="g">5.8.</subfield><subfield code="t">Using the Public Key to Pass a Secret Key --</subfield><subfield code="g">5.9.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="g">6.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">6.2.</subfield><subfield code="t">Methods of Authentication --</subfield><subfield code="g">6.3.</subfield><subfield code="t">Digital Certificates and PKI --</subfield><subfield code="g">6.3.1.</subfield><subfield code="t">PM and Trust --</subfield><subfield code="g">6.3.2.</subfield><subfield code="t">Digital Certificate Types --</subfield><subfield code="g">6.3.3.</subfield><subfield code="t">Digital Certificate Reader --</subfield><subfield code="g">6.4.</subfield><subfield code="t">Key and Certificate Management --</subfield><subfield code="g">6.5.</subfield><subfield code="t">Creating a Signed Certificate --</subfield><subfield code="g">6.6.</subfield><subfield code="t">Digital Certificate Passing --</subfield><subfield code="g">6.7.</subfield><subfield code="t">Email Encryption --</subfield><subfield code="g">6.8.</subfield><subfield code="t">Kerberos --</subfield><subfield code="g">6.9.</subfield><subfield code="t">Kerberos Key Sharing --</subfield><subfield code="g">6.10.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="g">7.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">7.2.</subfield><subfield code="t">SSL/TLS Connections --</subfield><subfield code="g">7.3.</subfield><subfield code="t">SSUFLS Handshaking --</subfield><subfield code="g">7.4.</subfield><subfield code="t">SSL Risks --</subfield><subfield code="g">7.5.</subfield><subfield code="t">VPN Tunnels --</subfield><subfield code="g">7.6.</subfield><subfield code="t">IKE --</subfield><subfield code="g">7.6.1.</subfield><subfield code="t">Phase 1 --</subfield><subfield code="g">7.6.2.</subfield><subfield code="t">Phase 2 --</subfield><subfield code="g">7.7.</subfield><subfield code="t">Tor --</subfield><subfield code="g">7.7.1.</subfield><subfield code="t">Tor Encryption --</subfield><subfield code="g">7.7.2.</subfield><subfield code="t">Examining Tor Traffic --</subfield><subfield code="g">7.8.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">References --</subfield><subfield code="g">8.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">8.2.</subfield><subfield code="t">Key Escrow --</subfield><subfield code="g">8.3.</subfield><subfield code="t">Cracking the Code --</subfield><subfield code="g">8.4.</subfield><subfield code="t">RSA Cracking --</subfield><subfield code="g">8.4.1.</subfield><subfield code="t">RSA Crack with Different e Value --</subfield><subfield code="g">8.4.2.</subfield><subfield code="t">Cracking RSA by Factorizing N --</subfield><subfield code="g">8.4.3.</subfield><subfield code="t">When Me Is less than N --</subfield><subfield code="g">8.4.4.</subfield><subfield code="t">RSA Crack with Chinese Remainder Theory (CRT) --</subfield><subfield code="g">8.4.5.</subfield><subfield code="t">Chosen Cipher Attack --</subfield><subfield code="g">8.4.6.</subfield><subfield code="t">Blinding Attack --</subfield><subfield code="g">8.4.7.</subfield><subfield code="t">Bleichenbacher's Attack --</subfield><subfield code="g">8.5.</subfield><subfield code="t">AES Cracking --</subfield><subfield code="g">8.5.1.</subfield><subfield code="t">AES Copy-and-Paste --</subfield><subfield code="g">8.5.2.</subfield><subfield code="t">AES (Brute Force) --</subfield><subfield code="g">8.5.3.</subfield><subfield code="t">AES Cracking with Non-Random Numbers --</subfield><subfield code="g">8.6.</subfield><subfield code="t">Digital Certificate Cracking --</subfield><subfield code="g">8.7.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">References --</subfield><subfield code="g">9.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">9.2.</subfield><subfield code="t">Light-Weight Symmetric Methods --</subfield><subfield code="g">9.3.</subfield><subfield code="t">Light-Weight Hashing --</subfield><subfield code="g">9.4.</subfield><subfield code="t">Other Light Weight Ciphers --</subfield><subfield code="g">9.5.</subfield><subfield code="t">Secret Shares --</subfield><subfield code="g">9.6.</subfield><subfield code="t">Post Quantum Cryptography --</subfield><subfield code="g">9.7.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">References --</subfield><subfield code="g">10.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">10.2.</subfield><subfield code="t">Bitcoins, Blockchain and Miners --</subfield><subfield code="g">10.2.1.</subfield><subfield code="t">Bitcoin Transactions --</subfield><subfield code="g">10.2.2.</subfield><subfield code="t">Mining Process --</subfield><subfield code="g">10.3.</subfield><subfield code="t">Ethereum --</subfield><subfield code="g">10.3.1.</subfield><subfield code="t">Gas --</subfield><subfield code="g">10.3.2.</subfield><subfield code="t">Practical Implementation of Ethereum --</subfield><subfield code="g">10.3.3.</subfield><subfield code="t">Smart Contracts --</subfield><subfield code="g">10.4.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">References --</subfield><subfield code="g">11.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">11.2.</subfield><subfield code="t">ZKP: Discrete Logs --</subfield><subfield code="g">11.3.</subfield><subfield code="t">Commutative Encryption --</subfield><subfield code="g">11.4.</subfield><subfield code="t">Graphs and Hamiltonian Cycles --</subfield><subfield code="g">11.5.</subfield><subfield code="t">Feige-Fiat-Shamir --</subfield><subfield code="g">11.6.</subfield><subfield code="t">Non-interactive Random Oracle Access for Zero-knowledge Proof --</subfield><subfield code="g">11.7.</subfield><subfield code="t">Fair Coin Flip --</subfield><subfield code="g">11.8.</subfield><subfield code="t">ZKP: Paillier --</subfield><subfield code="g">11.9.</subfield><subfield code="t">Oblivious Transfer (OT) --</subfield><subfield code="g">11.10.</subfield><subfield code="t">Scrambled Circuits --</subfield><subfield code="g">11.11.</subfield><subfield code="t">Millionaire's Problem --</subfield><subfield code="g">11.12.</subfield><subfield code="t">RAPPOR --</subfield><subfield code="g">11.13.</subfield><subfield code="t">Secure Function Evaluation (SFE) --</subfield><subfield code="g">11.14.</subfield><subfield code="t">Secure Remote Password (SRP) Protocol --</subfield><subfield code="g">11.15.</subfield><subfield code="t">Lab/Tutorial --</subfield><subfield code="t">Reference --</subfield><subfield code="g">12.1.</subfield><subfield code="t">Introduction --</subfield><subfield code="g">12.2.</subfield><subfield code="t">RC4 --</subfield><subfield code="g">12.3.</subfield><subfield code="t">WEP --</subfield><subfield code="g">12.4.</subfield><subfield code="t">Wi-fi Standards --</subfield><subfield code="g">12.5.</subfield><subfield code="t">WPA and WPA-2 --</subfield><subfield code="g">12.6.</subfield><subfield code="t">WPA-2 Handshaking --</subfield><subfield code="g">12.7.</subfield><subfield code="t">Cracking WPA-2 PSK --</subfield><subfield code="g">12.8.</subfield><subfield code="t">Stream Ciphers --</subfield><subfield code="g">12.9.</subfield><subfield code="t">A5 Ciphers --</subfield><subfield code="g">12.9.1.</subfield><subfield code="t">Practical Systems --</subfield><subfield code="g">12.9.2.</subfield><subfield code="t">A5/3 --</subfield><subfield code="g">12.10.</subfield><subfield code="t">Lab/tutorial --</subfield><subfield code="t">References.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs. Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs. This book provides extensive support through the associated website of: http: //asecuritysite.com/encryption.</subfield></datafield><datafield tag="545" ind1="0" ind2=" "><subfield code="a">William Buchanan</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001524</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Chiffrement (Informatique)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">Cryptography.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">SCIENCE / Energy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data encryption (Computer science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Buchanan, William J.</subfield><subfield code="t">Cryptography.</subfield><subfield code="d">Gistrup, Denmark : River Publishers, [2017]</subfield><subfield code="z">9788793609143</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">River Publishers series in information science and technology.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2015084441</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800585</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH40583797</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH34298003</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1800585</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1048393652 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:05Z |
institution | BVB |
isbn | 9788793609143 8793609140 8793379102 9788793379107 9781003337751 1003337759 9781000792126 1000792129 9781000795349 1000795349 |
language | English |
oclc_num | 1048393652 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | River Publishers, |
record_format | marc |
series | River Publishers series in information science and technology. |
series2 | River Publishers series in information science and technology. |
spelling | Buchanan, William J., author. Cryptography / William J. Buchanan, OBE. Gistrup, Denmark : River Publishers, [2017] 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier River Publishers series in information science and technology. Online resource; title from digital title page (viewed on November 09, 2017). Machine generated contents note: 1.1. Introduction -- 1.2. Simple Cipher Methods -- 1.2.1. Morse Code -- 1.2.2. Pigpen -- 1.2.3. Rail Code -- 1.2.4. BIFID Cipher -- 1.2.5. Playfair -- 1.2.6. Homophonic Substitution Code -- 1.2.7. Caesar Coding and Scrambled Alphabet -- 1.2.8. Vigenere Cipher -- 1.2.9. One-Time Pad (OTP) -- 1.3. Encoding Methods -- 1.3.1. Hexadecimal and Base-64 -- 1.4. Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5. Data Integrity (CRC-32) -- 1.6. Little Endian or Big Endian -- 1.7. Introduction to Probability and Number Theory -- 1.7.1. Combinations and Permutations -- 1.7.2. Probability Theory -- 1.7.3. Set Theory -- 1.7.4. Number Representations -- 1.7.5. Logarithms -- 1.8. Prime Numbers -- 1.9. Encryption Operators (mod, EX-OR and shift) -- 1.9.1. Mod Operator -- 1.9.2. Shift-Operators -- 1.9.3. Integers and Big Integers -- 1.9.4. X-OR -- 1.9.5. Modulo-2 Operations -- 1.10. GCD -- 1.11. Random Number Generators -- 1.11.1. Linear Congruential Random Numbers -- 1.12. Frequency Analysis -- 1.13. Lab/tutorial -- 2.1. Introduction -- 2.1.1. Early Days -- 2.1.2. Encryption -- 2.1.3. Secure Communications -- 2.1.4. Modern Methods -- 2.2. Key-based Cryptography -- 2.2.1. Computation Difficulty -- 2.2.2. Stream Encryption and Block Encryption -- 2.2.3. Padding -- 2.3. Brute-Force Analysis -- 2.4. Adding Salt -- 2.4.1. Cipher Block Chaining CBC -- 2.4.2. Cipher Feedback (CFB) -- 2.4.3. Output Feedback (OFB) -- 2.4.4. Counter Mode -- 2.4.5. CBC Example -- 2.5. AES -- 2.5.1. Substitution Bytes (S-box) -- 2.5.2. Shift Row Transformation -- 2.5.3. Mix Column Transformation -- 2.5.4. Add Round Key Transformation -- 2.6. Secret-Key Encryption -- 2.6.1. DES/3-DES -- 2.6.2. RC4 -- 2.6.3. AES/Rijndael -- 2.6.4. IDEA -- 2.6.5. RC5 -- 2.6.6. Skipjack -- 2.6.7. Blowfish -- 2.6.8. Twofish -- 2.6.9. Camellia -- 2.6.10. XTEA -- 2.7. Key Entropy -- 2.8. OpenSSL -- 2.9. Pohlog-Hellman -- 2.10. Lab/tutorial -- 3.1. Introduction -- 3.2. Hashing Methods -- 3.3. Problems with Hashes -- 3.3.1. Hash Cracking -- 3.4. Salting the Hash Value -- 3.5. Common Hashing Methods -- 3.5.1. LM Hashing -- 3.5.2. APR1 (MD5 with Salt) -- 3.5.3. SHA 1, SHA256 and SHA512 -- 3.5.4. PHPass -- 3.5.5. Non-Cryptographic Hashes -- 3.6. Authenticating the Sender -- 3.7. HMAC (Hash Message Authentication Code) -- 3.8. Password Hashing -- 3.9. Password Cracking -- 3.10. One Time Passwords -- 3.11. Time Stamp Protocol -- 3.12. Winnowing and Chaffing -- 3.13. SHA-3 -- 3.14. Lab/Tutorial -- References -- 4.1. Introduction -- 4.2. RSA -- 4.3. Elliptic Curve Ciphers (ECC) -- 4.4. ElGamal -- 4.5. Cramer-Shoup -- 4.6. Paillier Cryptosystem -- 4.7. Knapsack Encryption -- 4.8. Identity-Based Encryption -- 4.9. Lab/Tutorial -- Reference -- 5.1. Introduction -- 5.2. Diffie-Hellman Key Exchange -- 5.3. Creating the Generator -- 5.4. Diffie-Hellman Examples -- 5.5. Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6. (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7. Diffie-Hellman Weaknesses -- 5.8. Using the Public Key to Pass a Secret Key -- 5.9. Lab/Tutorial -- 6.1. Introduction -- 6.2. Methods of Authentication -- 6.3. Digital Certificates and PKI -- 6.3.1. PM and Trust -- 6.3.2. Digital Certificate Types -- 6.3.3. Digital Certificate Reader -- 6.4. Key and Certificate Management -- 6.5. Creating a Signed Certificate -- 6.6. Digital Certificate Passing -- 6.7. Email Encryption -- 6.8. Kerberos -- 6.9. Kerberos Key Sharing -- 6.10. Lab/Tutorial -- 7.1. Introduction -- 7.2. SSL/TLS Connections -- 7.3. SSUFLS Handshaking -- 7.4. SSL Risks -- 7.5. VPN Tunnels -- 7.6. IKE -- 7.6.1. Phase 1 -- 7.6.2. Phase 2 -- 7.7. Tor -- 7.7.1. Tor Encryption -- 7.7.2. Examining Tor Traffic -- 7.8. Lab/Tutorial -- References -- 8.1. Introduction -- 8.2. Key Escrow -- 8.3. Cracking the Code -- 8.4. RSA Cracking -- 8.4.1. RSA Crack with Different e Value -- 8.4.2. Cracking RSA by Factorizing N -- 8.4.3. When Me Is less than N -- 8.4.4. RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5. Chosen Cipher Attack -- 8.4.6. Blinding Attack -- 8.4.7. Bleichenbacher's Attack -- 8.5. AES Cracking -- 8.5.1. AES Copy-and-Paste -- 8.5.2. AES (Brute Force) -- 8.5.3. AES Cracking with Non-Random Numbers -- 8.6. Digital Certificate Cracking -- 8.7. Lab/Tutorial -- References -- 9.1. Introduction -- 9.2. Light-Weight Symmetric Methods -- 9.3. Light-Weight Hashing -- 9.4. Other Light Weight Ciphers -- 9.5. Secret Shares -- 9.6. Post Quantum Cryptography -- 9.7. Lab/Tutorial -- References -- 10.1. Introduction -- 10.2. Bitcoins, Blockchain and Miners -- 10.2.1. Bitcoin Transactions -- 10.2.2. Mining Process -- 10.3. Ethereum -- 10.3.1. Gas -- 10.3.2. Practical Implementation of Ethereum -- 10.3.3. Smart Contracts -- 10.4. Lab/Tutorial -- References -- 11.1. Introduction -- 11.2. ZKP: Discrete Logs -- 11.3. Commutative Encryption -- 11.4. Graphs and Hamiltonian Cycles -- 11.5. Feige-Fiat-Shamir -- 11.6. Non-interactive Random Oracle Access for Zero-knowledge Proof -- 11.7. Fair Coin Flip -- 11.8. ZKP: Paillier -- 11.9. Oblivious Transfer (OT) -- 11.10. Scrambled Circuits -- 11.11. Millionaire's Problem -- 11.12. RAPPOR -- 11.13. Secure Function Evaluation (SFE) -- 11.14. Secure Remote Password (SRP) Protocol -- 11.15. Lab/Tutorial -- Reference -- 12.1. Introduction -- 12.2. RC4 -- 12.3. WEP -- 12.4. Wi-fi Standards -- 12.5. WPA and WPA-2 -- 12.6. WPA-2 Handshaking -- 12.7. Cracking WPA-2 PSK -- 12.8. Stream Ciphers -- 12.9. A5 Ciphers -- 12.9.1. Practical Systems -- 12.9.2. A5/3 -- 12.10. Lab/tutorial -- References. Print version record. Annotation Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs. Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs. This book provides extensive support through the associated website of: http: //asecuritysite.com/encryption. William Buchanan Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Chiffrement (Informatique) COMPUTERS Security Cryptography. bisacsh SCIENCE / Energy bisacsh Data encryption (Computer science) fast Print version: Buchanan, William J. Cryptography. Gistrup, Denmark : River Publishers, [2017] 9788793609143 River Publishers series in information science and technology. http://id.loc.gov/authorities/names/no2015084441 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800585 Volltext |
spellingShingle | Buchanan, William J. Cryptography / River Publishers series in information science and technology. Introduction -- Simple Cipher Methods -- Morse Code -- Pigpen -- Rail Code -- BIFID Cipher -- Playfair -- Homophonic Substitution Code -- Caesar Coding and Scrambled Alphabet -- Vigenere Cipher -- One-Time Pad (OTP) -- Encoding Methods -- Hexadecimal and Base-64 -- Huffman Coding and Lempel-Viz Welsh (LZW) -- Data Integrity (CRC-32) -- Little Endian or Big Endian -- Introduction to Probability and Number Theory -- Combinations and Permutations -- Probability Theory -- Set Theory -- Number Representations -- Logarithms -- Prime Numbers -- Encryption Operators (mod, EX-OR and shift) -- Mod Operator -- Shift-Operators -- Integers and Big Integers -- X-OR -- Modulo-2 Operations -- GCD -- Random Number Generators -- Linear Congruential Random Numbers -- Frequency Analysis -- Lab/tutorial -- Early Days -- Encryption -- Secure Communications -- Modern Methods -- Key-based Cryptography -- Computation Difficulty -- Stream Encryption and Block Encryption -- Padding -- Brute-Force Analysis -- Adding Salt -- Cipher Block Chaining CBC -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode -- CBC Example -- AES -- Substitution Bytes (S-box) -- Shift Row Transformation -- Mix Column Transformation -- Add Round Key Transformation -- Secret-Key Encryption -- DES/3-DES -- RC4 -- AES/Rijndael -- IDEA -- RC5 -- Skipjack -- Blowfish -- Twofish -- Camellia -- XTEA -- Key Entropy -- OpenSSL -- Pohlog-Hellman -- Hashing Methods -- Problems with Hashes -- Hash Cracking -- Salting the Hash Value -- Common Hashing Methods -- LM Hashing -- APR1 (MD5 with Salt) -- SHA 1, SHA256 and SHA512 -- PHPass -- Non-Cryptographic Hashes -- Authenticating the Sender -- HMAC (Hash Message Authentication Code) -- Password Hashing -- Password Cracking -- One Time Passwords -- Time Stamp Protocol -- Winnowing and Chaffing -- SHA-3 -- Lab/Tutorial -- References -- RSA -- Elliptic Curve Ciphers (ECC) -- ElGamal -- Cramer-Shoup -- Paillier Cryptosystem -- Knapsack Encryption -- Identity-Based Encryption -- Reference -- Diffie-Hellman Key Exchange -- Creating the Generator -- Diffie-Hellman Examples -- Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- Diffie-Hellman Weaknesses -- Using the Public Key to Pass a Secret Key -- Methods of Authentication -- Digital Certificates and PKI -- PM and Trust -- Digital Certificate Types -- Digital Certificate Reader -- Key and Certificate Management -- Creating a Signed Certificate -- Digital Certificate Passing -- Email Encryption -- Kerberos -- Kerberos Key Sharing -- SSL/TLS Connections -- SSUFLS Handshaking -- SSL Risks -- VPN Tunnels -- IKE -- Phase 1 -- Phase 2 -- Tor -- Tor Encryption -- Examining Tor Traffic -- Key Escrow -- Cracking the Code -- RSA Cracking -- RSA Crack with Different e Value -- Cracking RSA by Factorizing N -- When Me Is less than N -- RSA Crack with Chinese Remainder Theory (CRT) -- Chosen Cipher Attack -- Blinding Attack -- Bleichenbacher's Attack -- AES Cracking -- AES Copy-and-Paste -- AES (Brute Force) -- AES Cracking with Non-Random Numbers -- Digital Certificate Cracking -- Light-Weight Symmetric Methods -- Light-Weight Hashing -- Other Light Weight Ciphers -- Secret Shares -- Post Quantum Cryptography -- Bitcoins, Blockchain and Miners -- Bitcoin Transactions -- Mining Process -- Ethereum -- Gas -- Practical Implementation of Ethereum -- Smart Contracts -- ZKP: Discrete Logs -- Commutative Encryption -- Graphs and Hamiltonian Cycles -- Feige-Fiat-Shamir -- Non-interactive Random Oracle Access for Zero-knowledge Proof -- Fair Coin Flip -- ZKP: Paillier -- Oblivious Transfer (OT) -- Scrambled Circuits -- Millionaire's Problem -- RAPPOR -- Secure Function Evaluation (SFE) -- Secure Remote Password (SRP) Protocol -- WEP -- Wi-fi Standards -- WPA and WPA-2 -- WPA-2 Handshaking -- Cracking WPA-2 PSK -- Stream Ciphers -- A5 Ciphers -- Practical Systems -- A5/3 -- References. Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Chiffrement (Informatique) COMPUTERS Security Cryptography. bisacsh SCIENCE / Energy bisacsh Data encryption (Computer science) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001524 |
title | Cryptography / |
title_alt | Introduction -- Simple Cipher Methods -- Morse Code -- Pigpen -- Rail Code -- BIFID Cipher -- Playfair -- Homophonic Substitution Code -- Caesar Coding and Scrambled Alphabet -- Vigenere Cipher -- One-Time Pad (OTP) -- Encoding Methods -- Hexadecimal and Base-64 -- Huffman Coding and Lempel-Viz Welsh (LZW) -- Data Integrity (CRC-32) -- Little Endian or Big Endian -- Introduction to Probability and Number Theory -- Combinations and Permutations -- Probability Theory -- Set Theory -- Number Representations -- Logarithms -- Prime Numbers -- Encryption Operators (mod, EX-OR and shift) -- Mod Operator -- Shift-Operators -- Integers and Big Integers -- X-OR -- Modulo-2 Operations -- GCD -- Random Number Generators -- Linear Congruential Random Numbers -- Frequency Analysis -- Lab/tutorial -- Early Days -- Encryption -- Secure Communications -- Modern Methods -- Key-based Cryptography -- Computation Difficulty -- Stream Encryption and Block Encryption -- Padding -- Brute-Force Analysis -- Adding Salt -- Cipher Block Chaining CBC -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode -- CBC Example -- AES -- Substitution Bytes (S-box) -- Shift Row Transformation -- Mix Column Transformation -- Add Round Key Transformation -- Secret-Key Encryption -- DES/3-DES -- RC4 -- AES/Rijndael -- IDEA -- RC5 -- Skipjack -- Blowfish -- Twofish -- Camellia -- XTEA -- Key Entropy -- OpenSSL -- Pohlog-Hellman -- Hashing Methods -- Problems with Hashes -- Hash Cracking -- Salting the Hash Value -- Common Hashing Methods -- LM Hashing -- APR1 (MD5 with Salt) -- SHA 1, SHA256 and SHA512 -- PHPass -- Non-Cryptographic Hashes -- Authenticating the Sender -- HMAC (Hash Message Authentication Code) -- Password Hashing -- Password Cracking -- One Time Passwords -- Time Stamp Protocol -- Winnowing and Chaffing -- SHA-3 -- Lab/Tutorial -- References -- RSA -- Elliptic Curve Ciphers (ECC) -- ElGamal -- Cramer-Shoup -- Paillier Cryptosystem -- Knapsack Encryption -- Identity-Based Encryption -- Reference -- Diffie-Hellman Key Exchange -- Creating the Generator -- Diffie-Hellman Examples -- Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- Diffie-Hellman Weaknesses -- Using the Public Key to Pass a Secret Key -- Methods of Authentication -- Digital Certificates and PKI -- PM and Trust -- Digital Certificate Types -- Digital Certificate Reader -- Key and Certificate Management -- Creating a Signed Certificate -- Digital Certificate Passing -- Email Encryption -- Kerberos -- Kerberos Key Sharing -- SSL/TLS Connections -- SSUFLS Handshaking -- SSL Risks -- VPN Tunnels -- IKE -- Phase 1 -- Phase 2 -- Tor -- Tor Encryption -- Examining Tor Traffic -- Key Escrow -- Cracking the Code -- RSA Cracking -- RSA Crack with Different e Value -- Cracking RSA by Factorizing N -- When Me Is less than N -- RSA Crack with Chinese Remainder Theory (CRT) -- Chosen Cipher Attack -- Blinding Attack -- Bleichenbacher's Attack -- AES Cracking -- AES Copy-and-Paste -- AES (Brute Force) -- AES Cracking with Non-Random Numbers -- Digital Certificate Cracking -- Light-Weight Symmetric Methods -- Light-Weight Hashing -- Other Light Weight Ciphers -- Secret Shares -- Post Quantum Cryptography -- Bitcoins, Blockchain and Miners -- Bitcoin Transactions -- Mining Process -- Ethereum -- Gas -- Practical Implementation of Ethereum -- Smart Contracts -- ZKP: Discrete Logs -- Commutative Encryption -- Graphs and Hamiltonian Cycles -- Feige-Fiat-Shamir -- Non-interactive Random Oracle Access for Zero-knowledge Proof -- Fair Coin Flip -- ZKP: Paillier -- Oblivious Transfer (OT) -- Scrambled Circuits -- Millionaire's Problem -- RAPPOR -- Secure Function Evaluation (SFE) -- Secure Remote Password (SRP) Protocol -- WEP -- Wi-fi Standards -- WPA and WPA-2 -- WPA-2 Handshaking -- Cracking WPA-2 PSK -- Stream Ciphers -- A5 Ciphers -- Practical Systems -- A5/3 -- References. |
title_auth | Cryptography / |
title_exact_search | Cryptography / |
title_full | Cryptography / William J. Buchanan, OBE. |
title_fullStr | Cryptography / William J. Buchanan, OBE. |
title_full_unstemmed | Cryptography / William J. Buchanan, OBE. |
title_short | Cryptography / |
title_sort | cryptography |
topic | Data encryption (Computer science) http://id.loc.gov/authorities/subjects/sh94001524 Chiffrement (Informatique) COMPUTERS Security Cryptography. bisacsh SCIENCE / Energy bisacsh Data encryption (Computer science) fast |
topic_facet | Data encryption (Computer science) Chiffrement (Informatique) COMPUTERS Security Cryptography. SCIENCE / Energy |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1800585 |
work_keys_str_mv | AT buchananwilliamj cryptography |