Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless
Everyday cryptography: fundamental principles and applications
โ Scribed by Oxford University Press.; Martin, Keith M
- Publisher
- Oxford University Press
- Year
- 2012
- Tongue
- English
- Leaves
- 553
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research.
Everyday Cryptographyis a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this fascinating and increasingly important area of technology.
โฆ Table of Contents
Cover......Page 1
Contents......Page 16
List of Figures......Page 20
List of Tables......Page 23
Part I: Setting the Scene......Page 24
1.1 Why information security?......Page 25
1.2 Security risks......Page 30
1.3 Security services......Page 34
1.4 Fundamentals of cryptosystems......Page 37
1.5 Cryptosystem security assumptions......Page 47
1.6 Breaking cryptosystems......Page 53
1.8 Further reading......Page 63
1.9 Activities......Page 65
2. Historical Cryptosystems......Page 70
2.1 Monoalphabetic ciphers......Page 71
2.2 Historical advances......Page 81
2.4 Further reading......Page 93
2.5 Activities......Page 94
3.1 Theoretical security......Page 99
3.2 Practical security......Page 110
3.4 Further reading......Page 124
3.5 Activities......Page 125
Part II: The Cryptographic Toolkit......Page 128
4.1 Classification of symmetric encryption algorithms......Page 129
4.2 Stream ciphers......Page 131
4.3 Block ciphers......Page 137
4.4 The Data Encryption Standard......Page 140
4.5 The Advanced Encryption Standard......Page 148
4.6 Modes of operation......Page 152
4.8 Further reading......Page 168
4.9 Activities......Page 169
5. Public-Key Encryption......Page 173
5.1 Public-key cryptography......Page 174
5.2 RSA......Page 184
5.3 ElGamal and elliptic curve variants......Page 190
5.4 Comparison of RSA, ElGamal and elliptic curve variants......Page 196
5.5 Uses in practice of public-key cryptosystems......Page 201
5.7 Further reading......Page 204
5.8 Activities......Page 205
6.1 Different levels of data integrity......Page 209
6.2 Hash functions......Page 211
6.3 Message authentication codes......Page 228
6.4 Summary......Page 240
6.6 Activities......Page 241
7.1 Digital signatures......Page 246
7.2 Non-repudiation using symmetric techniques......Page 250
7.3 Digital signature schemes based on RSA......Page 253
7.4 Digital signature schemes in practice......Page 264
7.6 Further reading......Page 272
7.7 Activities......Page 273
8.1 Random number generation......Page 276
8.2 Providing freshness......Page 282
8.3 Fundamentals of entity authentication......Page 288
8.4 Passwords......Page 293
8.5 Dynamic password schemes......Page 296
8.6 Zero-knowledge mechanisms......Page 300
8.8 Further reading......Page 303
8.9 Activities......Page 304
9.1 Protocol basics......Page 309
9.2 From objectives to a protocol......Page 312
9.3 Analysing a simple protocol......Page 316
9.4 Authentication and key establishment protocols......Page 332
9.5 Summary......Page 344
9.7 Activities......Page 345
Part III: Key Management......Page 348
10. Key Management......Page 349
10.1 Key management fundamentals......Page 350
10.2 Key lengths and lifetimes......Page 355
10.3 Key generation......Page 358
10.4 Key establishment......Page 362
10.5 Key storage......Page 373
10.6 Key usage......Page 382
10.7 Governing key management......Page 390
10.9 Further reading......Page 393
10.10 Activities......Page 394
11. Public-Key Management......Page 399
11.1 Certification of public keys......Page 400
11.2 The certificate lifecycle......Page 405
11.3 Public-key management models......Page 413
11.4 Alternative approaches......Page 420
11.5 Summary......Page 426
11.6 Further reading......Page 427
11.7 Activities......Page 428
Part IV: Applications......Page 432
12. Cryptographic Applications......Page 433
12.1 Cryptography on the Internet......Page 434
12.2 Cryptography for wireless local area networks......Page 445
12.3 Cryptography for mobile telecommunications......Page 457
12.4 Cryptography for secure payment card transactions......Page 467
12.5 Cryptography for video broadcasting......Page 478
12.6 Cryptography for identity cards......Page 486
12.7 Cryptography for home users......Page 497
12.8 Summary......Page 504
12.9 Further reading......Page 505
12.10 Activities......Page 506
13. Closing Remarks......Page 511
A.1 Decimal, binary and hex......Page 513
A.2 Modular arithmetic......Page 521
A.3 The mathematics of RSA......Page 526
A.4 The mathematics of ElGamal......Page 532
A.5 Further reading......Page 534
Bibliography......Page 535
B......Page 544
C......Page 545
D......Page 546
E......Page 547
K......Page 548
M......Page 549
P......Page 550
R......Page 551
S......Page 552
Z......Page 553
โฆ Subjects
Computer Science;Programming;Computers
๐ SIMILAR VOLUMES
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless
<span>Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi<br>netw
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, pay
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, pay
Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for everyday technologies such as the Internet, mobile phones, Wi-Fi networks, pay