Text
Cryptography in the database: the last line defense
Table of Contents:
1. Introduction
1.1. Cryptographic Algorithms
1.2. Block Ciphers
1.3. Cryptographer and Cryptanalyst
1.4. Security
2. DES
2.1. DES Description
2.1.1. The Round Function
2.2. Design Features
2.3. Structural Properties
2.3.1. The Complementation Property
2.3.2. Weak and Semi-Weak Keys
2.4. DES Variants
2.4.1. Triple-DES
2.4.2. DESX
2.5. DES in Context
2.6. Getting the Source
3. AES
3.1. AES Description
3.1.1. Arithmetic in GF (2n)
3.1.2. Encryption with AES
3.1.3. Decryption with AES
3.1.4. AES Key Schedule
3.1.5. AES Design Features
3.2. AES State of the Art
3.2.1. Differential and Linear Cryptanalysis
3.2.2. Structural Attacks
3.2.3. Algebraic Analysis
3.2.4. Related-Key Analysis
3.2.5. Side-Channel Cryptanalysis
3.3. AES in Context
3.4. Getting to the Source
4. Using Block Ciphers
4.1. Block Encryption
4.1.1. Electronic Code Boook Mode
4.1.2. Cipher Block Chaining Mode
4.2. Stream Encryption
4.2.1. Cipher Feedback Mode
4.2.2. Output Feedback Mode
4.2.3. Counter Mode
4.3. Starting and Finishing
4.3.1. Choosing the IV
4.3.2. Padding
4.3.3. Ciphertext Stealing
4.4. Authentication
4.4.1. CBC-MAC
4.4.2. OMAC
4.5. Authenticated Encryption
4.5.1. CCM Mode
4.5.2. EAX Mode
4.6. Hashing
4.6.1. Three Important Constructions
4.6.2. Double Block Length Constructions
4.6.3. The SHA-3 Competition
4.7. Getting to the Source
5. Brute Force Attacks
5.1. Time-Memory Trade-offs
5.1.1. Hellman
No other version available