Contents: Part I Database security 1 The case for database security 2 Securing database with cryptography Part II A cryptographic infrastructure 3 An overview of cryptographic infrastructure 4 Cryptographic engines and algorithms 5 Keys: vaults, manifests, and managers 6 Cryptographic providers and consumers Part II The cryptographic project 7 Managing the cryptographic p…
Table of Contents: 1. Introduction 1.1. Cryptographic Algorithms 1.2. Block Ciphers 1.3. Cryptographer and Cryptanalyst 1.4. Security 2. DES 2.1. DES Description 2.1.1. The Round Function 2.2. Design Features 2.3. Structural Properties 2.3.1. The Complementation Property 2.3.2. Weak and Semi-Weak Keys 2.4. DES Variants 2.4.1. Triple-DES 2.4.2. DESX 2.5. DES in Context 2.6. Getting the Source 3.…