Communication system security
โ Scribed by Chen, Lidong; Gong, Guang
- Publisher
- CRC Press
- Year
- 2012
- Tongue
- English
- Leaves
- 738
- Series
- Chapman & Hall/CRC cryptography and network security
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Table of Contents
Content: Introduction Nodes, Links, and Layers Information Security Objectives and Protection Mechanisms Trust Model Threat Model Communication System Security PRACTICAL CRYPTOGRAPHY PRIMITIVES Pseudorandom Sequence Generators Feedback Shift Register Sequences Linear Spans and Berlekamp-Massey Algorithm Randomness Criteria of a PRSG Randomness Properties of m-Sequences Nonlinear Generators Blum-Blum-Shub (BBS) Generators Security Modes of PRSGs Known Attacks Design of Stream Ciphers Design Principles of Stream Ciphers Stream Ciphers in Communication Systems WG Stream Cipher Grain and Grain-Like Generators Trivium and Trivium-Like Generators Snow 3G AIDA/Cube Attacks Design of Block Ciphers, Hash Functions, and MAC Design Principles of Block Ciphers DES (Data Encryption Standard, NIST 1976) AES (Advanced Encryption Standard) Rijndael Encryption Modes Hash Functions Message Authentication Code (MAC) Birthday Attack and Time-Memory Trade-Off Attacks Public-Key Cryptographic Algorithms Security of Public-Key Cryptography Diffie-Hellman Key Exchange RSA Encryption and Digital Signature ElGamal Digital Signature Algorithm and Digital Signature Standard Elliptic Curve Digital Signature Algorithm (EC-DSA) Identity-Based Cryptography from Bilinear Pairing SECURITY MECHANISMS AND PROTOCOLS Security Infrastructure Infrastructure Support Authentication Server Certificate Authority Key Generation and Distribution Server Signing Server Establish Protected Communications Mutual Authentication Key Establishment Cryptographic Algorithm Negotiation Protected Communications Network Security Protocols Internet Security Protocols (IPsec) Transport Layer Security (TLS) The Secure Shell (SSH) Hop-by-Hop versus End-to-End Protection Intra-Domain versus Inter-Domain Protection Network Domain Security in Cellular Systems WIRELESS SECURITY Network Access Authentication Basic Concepts in Access Authentication Authentication and Key Agreement (AKA) in 3G and LTE Authentication, Authorization, and Accounting (AAA) Extensible Authentication Protocol (EAP) Wireless Network Security Special Aspects of Wireless Protection UMTS and LTE Air Link Protection IEEE 802.11 Security Solutions Security for Mobility Challenges in Establishing Protection for a Mobile Node Secure Handover in UMTS and LTE Options for Fast Authentication Secure Fast BSS Transition in IEEE 802.11 Security in Mobile IP - Mobility Information Protection Media Independent Handover - Service Protection Broadcast and Multicast Key Distribution and Authentication Basic Models for Multicast Key Distribution Logic Key Tree Based Multicast Key Distribution Hash Chain Based Authentication Merkle Trees for Authentication SYSTEM SECURITY Trusted Platform The Platform Introduction to Trusted Platform Trust Principles and Basic Mechanisms Technologies and Methodologies for Trusted Platforms Trusted Platform in Practice Physical-Layer Security Shannon's Perfect Secrecy Wyner's Wiretap Channel Wiretap Codes for Achievable Secrecy Using Parity Check Codes Wiretap Codes for Achievable Secrecy Using Linear Codes Other Methods for Physical-Layer Security Spread-Spectrum Techniques for Anti-Jamming Attacks Some Basic Concepts of Digital Communications BPSK Direct-Sequence Spread-Spectrum Systems Frequency-Hopping Spread Spectrum The Jamming Attacks Code-Division Multiple Access (CDMA) and Jamming Capacity Bloom Filters and Or-Channel Schemes Appendix A: Computations in Finite Fields Appendix B: Some Mathematical Formulae Appendix C: Signals and Spectra in Physical Layer Index Notes, Exercises, and a Bibliography appear at the end of each chapter.
โฆ Subjects
Telecommunication -- Security measures. Telecommunication / Security measures.
๐ SIMILAR VOLUMES
Mobile Communication Systems and Security arms readers with a thorough understanding of all major cellular air-interface technologies and their security layer techniques. Rhee covers the technological development of wireless mobile communications in compliance with each iterative generation up to 3G
This volume details what every computer scientist ought to know about cryptographic systems, security protocols, and secure information flow in programs. Highlights include discussions of the new advanced encryption standard "Rijndael"; an optimal public-key encryption using RSA which turns "textboo