Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Cryptography in the database: the last line defense
Bookmark Share

Text

Cryptography in the database: the last line defense

Kenan, Kevin - Personal Name;

Table of Contents:
1. Introduction
1.1. Cryptographic Algorithms
1.2. Block Ciphers
1.3. Cryptographer and Cryptanalyst
1.4. Security
2. DES
2.1. DES Description
2.1.1. The Round Function
2.2. Design Features
2.3. Structural Properties
2.3.1. The Complementation Property
2.3.2. Weak and Semi-Weak Keys
2.4. DES Variants
2.4.1. Triple-DES
2.4.2. DESX
2.5. DES in Context
2.6. Getting the Source
3. AES
3.1. AES Description
3.1.1. Arithmetic in GF (2n)
3.1.2. Encryption with AES
3.1.3. Decryption with AES
3.1.4. AES Key Schedule
3.1.5. AES Design Features
3.2. AES State of the Art
3.2.1. Differential and Linear Cryptanalysis
3.2.2. Structural Attacks
3.2.3. Algebraic Analysis
3.2.4. Related-Key Analysis
3.2.5. Side-Channel Cryptanalysis
3.3. AES in Context
3.4. Getting to the Source
4. Using Block Ciphers
4.1. Block Encryption
4.1.1. Electronic Code Boook Mode
4.1.2. Cipher Block Chaining Mode
4.2. Stream Encryption
4.2.1. Cipher Feedback Mode
4.2.2. Output Feedback Mode
4.2.3. Counter Mode
4.3. Starting and Finishing
4.3.1. Choosing the IV
4.3.2. Padding
4.3.3. Ciphertext Stealing
4.4. Authentication
4.4.1. CBC-MAC
4.4.2. OMAC
4.5. Authenticated Encryption
4.5.1. CCM Mode
4.5.2. EAX Mode
4.6. Hashing
4.6.1. Three Important Constructions
4.6.2. Double Block Length Constructions
4.6.3. The SHA-3 Competition
4.7. Getting to the Source
5. Brute Force Attacks
5.1. Time-Memory Trade-offs
5.1.1. Hellman


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.82 KEN c
00000760
Available
Detail Information
Series Title
--
Call Number
005.82 KEN c
Publisher
New Jersey : Symantec Press., 2006
Collation
xxii, 277 hlm.: ilus.; 23 cm
Language
English
ISBN/ISSN
9780321320735
Classification
005.82
Content Type
-
Media Type
-
Carrier Type
-
Edition
null
Subject(s)
Kriptografi
Specific Detail Info
-
Statement of Responsibility
Kevin Kenan
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?