Contents Introduction 1 Foundations of coding 1.1 From Julius Caesar to telecopy 1.2 Stream ciphers and probabilities 1.3 Block ciphers, algebra, and arithmetic 1.4 Decoding, decryption, attacks 2 Information theory and compression 2.1 Information theory 2.2 Statistical encoding 2.3 Heuristics of entropy reduction 2.4 Common compression codes 2.5 Lossy compression 3 Cryptolog…
Contents 1. Mathematical background 2. Computational complexity 3. Public key cryptography 4. Factorization methods 5. Properties of the RSA cryptosystem 6. Low-exponent RSA 7. Protocol and implementation attacks 8. RSA signatures
Contents 1 Introduction 2 Preliminaries 3 The sign of differences and their properties 4 Weaknesses of MD5 algorithm 5 Selection of weak input differences 6 Construct differential path and deduce sufficient conditions 7 Collision searching 8 MD5 collision attacks with only a single block 9 Conclusion and some suggestions on future research
Contents 1 Basic concepts and historical overview 2 Mathematical foundations of cryptography 3 Foundations of symmetric cryptography 4 Foundations of asymmetric cryptography 5 An electronic signature and hash functions 6 PGP Systems and truecrypt 7 Public key infrastructure 8 Cryptographic protocols 9 Cryptographic applications for network security
Contents 1. Through Hacker’s Eyes 2. Cryptovirology 3. Tools for Security and Insecurity 3.1 Sources of Entropy 3.2 Entropy Extraction via Hashing 3.3 Unbiasing a Biased Coin 3.4 Combining Weak Sources of Entropy 3.5 Pseudorandom Number Generators 3.6 Uniform Sampling 3.7 Random Permutation Generation 3.8 Sound Approach to Random Number Generation and Use 3.9 RNGs Are the Beati…
Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other sec…
Contents Part one: Introduction and economics Chapter 1 Foundation Chapter 2 Technology (Introduction) Chapter 3 Economics Chapter 4 Business applications Part Two: Bitcoin technology Chapter 5 Public key cryptography Chapter 6 Transactions Chapter 7 The blockchain Chapter 8 Wallets Chapter 9 Mining Part Three: The cryptocurrencies landscape Chapter 10 The origins of bitcoin C…
Contents 1 Introduction 2 Cryptography basics 3 PKI building blocks 4 PKI management and security 5 PKI roles and responsibilities 6 Security considerations 7 Operational considerations 8 Incident management 9 PKI governance, risk, and compliance 10 Advanced PKI