Text
Everyday cryptography : fundamental principles and applications
Machine generated contents note: pt. I Setting the Scene
1.Basic Principles
1.1.Why Information security?
1.2.Security risks
1.3.Security services
1.4.Fundamentals of cryptosystems
1.5.Cryptosystem security assumptions
1.6.Breaking cryptosystems
1.7.Summary
1.8.Further reading
1.9.Activities
2.Historical Cryptosystems
2.1.Monoalphabetic ciphers
2.2.Historical advances
2.3.Summary
2.4.Further reading
2.5.Activities
3.Theoretical versus Practical Security
3.1.Theoretical security
3.2.Practical security
3.3.Summary
3.4.Further reading
3.5.Activities
pt. II The Cryptographic Toolkit
4.Symmetric Encryption
4.1.Classification of symmetric encryption algorithms
4.2.Stream ciphers
4.3.Block ciphers
4.4.The Data Encryption Standard
4.5.The Advanced Encryption Standard
4.6.Modes of operation
4.7.Summary
4.8.Further reading
4.9.Activities
5.Public-Key Encryption
Contents note continued: 5.1.Public-key cryptography
5.2.RSA
5.3.ElGamal and elliptic curve variants
5.4.Comparison of RSA, ElGamal and elliptic curve variants
5.5.Uses in practice of public-key cryptosystems
5.6.Summary
5.7.Further reading
5.8.Activities
6.Data Integrity
6.1.Different levels of data integrity
6.2.Hash functions
6.3.Message authentication codes
6.4.Summary
6.5.Further reading
6.6.Activities
7.Digital Signature Schemes
7.1.Digital signatures
7.2.Non-repudiation using symmetric techniques
7.3.Digital signature schemes based on RSA
7.4.Digital signature schemes in practice
7.5.Summary
7.6.Further reading
7.7.Activities
8.Entity Authentication
8.1.Random number generation
8.2.Providing freshness
8.3.Fundamentals of entity authentication
8.4.Passwords
8.5.Dynamic password schemes
8.6.Zero-knowledge mechanisms
8.7.Summary
8.8.Further reading
8.9.Activities
Contents note continued: 9.Cryptographic Protocols
9.1.Protocol basics
9.2.From objectives to a protocol
9.3.Analysing a simple protocol
9.4.Authentication and key establishment protocols
9.5.Summary
9.6.Further reading
9.7.Activities
pt. III Key Management
10.Key Management
10.1.Key management fundamentals
10.2.Key lengths and lifetimes
10.3.Key generation
10.4.Key establishment
10.5.Key storage
10.6.Key usage
10.7.Governing key management
10.8.Summary
10.9.Further reading
10.10.Activities
11.Public-Key Management
11.1.Certification of public keys
11.2.The certificate lifecycle
11.3.Public-key management models
11.4.Alternative approaches
11.5.Summary
11.6.Further reading
11.7.Activities
pt. IV Applications
12.Cryptographic Applications
12.1.Cryptography on the Internet
12.2.Cryptography for wireless local area networks
12.3.Cryptography for mobile telecommunications
Contents note continued: 12.4.Cryptography for secure payment card transactions
12.5.Cryptography for video broadcasting
12.6.Cryptography for identity cards
12.7.Cryptography for home users
12.8.Summary
12.9.Further reading
12.10.Activities
13.Closing Remarks
No other version available