Contents: 1 Introduction 1.1 Trust problem 1.2 Ciphertext access control problem 1.3 Efficiency problem in multi-message cryptology 1.4 The challenges from quantum and biological computing 1.5 Organization 2 Proxy re-cryptography 2.1 Introduction 2.2 Proxy re cryptography 2.3 Proxy re-encryption 3 Attribute-based cryptography 3.1 Introduction 3.2 Universal definitions 3.3 Bo…
Contents: Chapter 1 Introduction 1.1 Digital watermarking 1.2 Digital steganography 1.3 Differences between watermarking and steganography 1.4 A brief history Chapter 2 Classification in digital watermarking 2.1 Classification based on characteristics 2.2 Classification based on applications Chapter 3 Mathematical preliminaries 3.1 Least-significant-bit substitution 3.2 …
DAFTAR ISI Bab 1 Pendahuluan 1.1. Cypherpunk 1.2. Uang 1.3. Basis data 1.4. Kriptografi Bab 2 Blockchain 2.1. Gambaran umum 2.2. Konsensus 2.3. Tipe blockchain 2.4. Keamanan Bab 3 Bitcoin 3.1. Sejarah bitcoin 3.2. Satoshi Nakamoto 3.3. Desentralisasi 3.4. Definisi bitcoin 3.5. Suplai terbatas 3.6. Transaksi bitcoin 3.7. Dompet bitcoin 3.8. Bitcoin blockchain explorer 3…
Contents: 1. Introduction 2. Anti-Counterfeiting and Securing Supply Chain security 3. Networked RFID Systems 4. EPC Network Architecture 5. Addressing insecurities and violations of privacy 6. RFID tag vulnerabilities in RFID systems 7. An evaluation framework 8. From Identification to Authentication- a review of RFID product authentication technique 9. EPC System for Safe and Secu…
Daftar isi: 1. PENDAHULUAN 1.1 Pendahuluan 1.2 Multimedia 1.3 Masalah keamanan 1.4 Ancaman keamanan 1.5 Aspek aspek keamanan komputer 2. PEMAHAMAN DASAR KEAMANAN MULTIMEDIA 2.1 Pendahuluan 2.2 Cryptography 2.3 Steganography 2.4 Digital watermarking 3. STEGANOGRAPHY 3.1 Pendahuluan 3.2 Sejarah steganography 3.3 Teknik steganography 3.4 Embeding methods 3.5 Method leaset 3…
Table of contents 1 Classic Ciphers 1 2 World War II Ciphers 25 3 Stream Ciphers 75 4 Block Ciphers 123 5 Hash Functions 187 6 Public Key Systems 259 7 Public Key Attacks 309 A-1 MD5 Tables A-2 Math A-2.1 Number Theory A-2.2 Group Theory A-2.3 Ring Theory A-2.4 Linear Algebra
Contents: Understanding Internet Security -- Protecting Against Eavesdroppers with Symmetric Cryptography -- Secure Key Exchange over an Insecure Medium with Public Key Cryptography -- Authenticating Communications Using Digital Signatures -- Creating a Network of Trust Using X.509 Certificates -- A Usable, Secure Communications Protocol: Client-Side TLS -- Adding Server-Side TLS 1.0 S…
Contents Introduction 1 Foundations of coding 1.1 From Julius Caesar to telecopy 1.2 Stream ciphers and probabilities 1.3 Block ciphers, algebra, and arithmetic 1.4 Decoding, decryption, attacks 2 Information theory and compression 2.1 Information theory 2.2 Statistical encoding 2.3 Heuristics of entropy reduction 2.4 Common compression codes 2.5 Lossy compression 3 Cryptolog…
Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures
Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research