Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Everyday cryptography : fundamental principles and applications
Bookmark Share

Text

Everyday cryptography : fundamental principles and applications

Martin, Keith M - Personal Name;

Machine generated contents note: pt. I Setting the Scene
1.Basic Principles
1.1.Why Information security?
1.2.Security risks
1.3.Security services
1.4.Fundamentals of cryptosystems
1.5.Cryptosystem security assumptions
1.6.Breaking cryptosystems
1.7.Summary
1.8.Further reading
1.9.Activities

2.Historical Cryptosystems
2.1.Monoalphabetic ciphers
2.2.Historical advances
2.3.Summary
2.4.Further reading
2.5.Activities
3.Theoretical versus Practical Security
3.1.Theoretical security
3.2.Practical security
3.3.Summary
3.4.Further reading
3.5.Activities

pt. II The Cryptographic Toolkit
4.Symmetric Encryption
4.1.Classification of symmetric encryption algorithms
4.2.Stream ciphers
4.3.Block ciphers
4.4.The Data Encryption Standard
4.5.The Advanced Encryption Standard
4.6.Modes of operation
4.7.Summary
4.8.Further reading
4.9.Activities

5.Public-Key Encryption
Contents note continued: 5.1.Public-key cryptography
5.2.RSA
5.3.ElGamal and elliptic curve variants
5.4.Comparison of RSA, ElGamal and elliptic curve variants
5.5.Uses in practice of public-key cryptosystems
5.6.Summary
5.7.Further reading
5.8.Activities

6.Data Integrity
6.1.Different levels of data integrity
6.2.Hash functions
6.3.Message authentication codes
6.4.Summary
6.5.Further reading
6.6.Activities

7.Digital Signature Schemes
7.1.Digital signatures
7.2.Non-repudiation using symmetric techniques
7.3.Digital signature schemes based on RSA
7.4.Digital signature schemes in practice
7.5.Summary
7.6.Further reading
7.7.Activities

8.Entity Authentication
8.1.Random number generation
8.2.Providing freshness
8.3.Fundamentals of entity authentication
8.4.Passwords
8.5.Dynamic password schemes
8.6.Zero-knowledge mechanisms
8.7.Summary
8.8.Further reading
8.9.Activities

Contents note continued: 9.Cryptographic Protocols
9.1.Protocol basics
9.2.From objectives to a protocol
9.3.Analysing a simple protocol
9.4.Authentication and key establishment protocols
9.5.Summary
9.6.Further reading
9.7.Activities

pt. III Key Management
10.Key Management
10.1.Key management fundamentals
10.2.Key lengths and lifetimes
10.3.Key generation
10.4.Key establishment
10.5.Key storage
10.6.Key usage
10.7.Governing key management
10.8.Summary
10.9.Further reading
10.10.Activities

11.Public-Key Management
11.1.Certification of public keys
11.2.The certificate lifecycle
11.3.Public-key management models
11.4.Alternative approaches
11.5.Summary
11.6.Further reading
11.7.Activities
pt. IV Applications

12.Cryptographic Applications
12.1.Cryptography on the Internet
12.2.Cryptography for wireless local area networks
12.3.Cryptography for mobile telecommunications
Contents note continued: 12.4.Cryptography for secure payment card transactions
12.5.Cryptography for video broadcasting
12.6.Cryptography for identity cards
12.7.Cryptography for home users
12.8.Summary
12.9.Further reading
12.10.Activities
13.Closing Remarks


Availability
#
Perpustakaan Poltek SSN (Rak 600) 652.8 MAR e
00000690
Available
Detail Information
Series Title
-
Call Number
652.8 MAR e
Publisher
New York : Oxford University Press., 2012
Collation
xxi, 530 hlm.: ilus.; 23 cm.
Language
English
ISBN/ISSN
9780199695591
Classification
652.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
-
Subject(s)
Kriptografi
Cryptography
Data Encryption (Computer Science)
Specific Detail Info
-
Statement of Responsibility
Keith M. Martin
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?