Contents 1. Through Hacker’s Eyes 2. Cryptovirology 3. Tools for Security and Insecurity 3.1 Sources of Entropy 3.2 Entropy Extraction via Hashing 3.3 Unbiasing a Biased Coin 3.4 Combining Weak Sources of Entropy 3.5 Pseudorandom Number Generators 3.6 Uniform Sampling 3.7 Random Permutation Generation 3.8 Sound Approach to Random Number Generation and Use 3.9 RNGs Are the Beati…
Contents Part I Introducing security metrics 1. What is a security metric 2. Designing effective security metrics 3. Understanding data Part II Implementing security metrics 4. The security process management framework 5. Analyzing security metrics data 6. Designing the security measurement project Part III Exploring security measurement projects 7. Measuring security operations…
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. This research monograph focuses on the role of cover signals, the distinguishing feature that requires us to treat steganography and steganalysis differently from other sec…
CONTENTS: 1.Introduction 1.1.Cryptographic Hashing 1.2.The SHA3 Competition 1.3.BLAKE, in a Nutshell 1.4.Conventions 2.Preliminaries 2.1.Applications 2.1.1.Modification Detection 2.1.2.Message Authentication 2.1.3.Digital Signatures 2.1.4.Pseudorandom Functions 2.1.5.Entropy Extraction and Key Derivation 2.1.6.Password Hashing 2.1.7.Data Identification 2.1.8.Key U…