CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…
Machine generated contents note: pt. I Setting the Scene 1.Basic Principles 1.1.Why Information security? 1.2.Security risks 1.3.Security services 1.4.Fundamentals of cryptosystems 1.5.Cryptosystem security assumptions 1.6.Breaking cryptosystems 1.7.Summary 1.8.Further reading 1.9.Activities 2.Historical Cryptosystems 2.1.Monoalphabetic ciphers 2.2.Historical advance…
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …
Anak judul: principles and practice. Termasuk bibliografi dan indeks. CONTENTS: Chapter 1 Overview < >1.1 Computer Security Concepts < >1.2 The OSI Security Architecture < >1.3 Security Attacks < >1.4 Security Services < >1.5 Security Mechanisms < >1.6 A Model for Network Security < >1.7 Recommended Reading < >1.8 …