Limit search to available items
Book Cover
E-book
Author Buchanan, William J., author

Title Cryptography / William J. Buchanan, OBE
Published Gistrup, Denmark : River Publishers, [2017]

Copies

Description 1 online resource
Series River Publishers series in information science and technology
River Publishers series in information science and technology.
Contents Machine generated contents note: 1.1. Introduction -- 1.2. Simple Cipher Methods -- 1.2.1. Morse Code -- 1.2.2. Pigpen -- 1.2.3. Rail Code -- 1.2.4. BIFID Cipher -- 1.2.5. Playfair -- 1.2.6. Homophonic Substitution Code -- 1.2.7. Caesar Coding and Scrambled Alphabet -- 1.2.8. Vigenere Cipher -- 1.2.9. One-Time Pad (OTP) -- 1.3. Encoding Methods -- 1.3.1. Hexadecimal and Base-64 -- 1.4. Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5. Data Integrity (CRC-32) -- 1.6. Little Endian or Big Endian -- 1.7. Introduction to Probability and Number Theory -- 1.7.1. Combinations and Permutations -- 1.7.2. Probability Theory -- 1.7.3. Set Theory -- 1.7.4. Number Representations -- 1.7.5. Logarithms -- 1.8. Prime Numbers -- 1.9. Encryption Operators (mod, EX-OR and shift) -- 1.9.1. Mod Operator -- 1.9.2. Shift-Operators -- 1.9.3. Integers and Big Integers -- 1.9.4. X-OR -- 1.9.5. Modulo-2 Operations -- 1.10. GCD -- 1.11. Random Number Generators -- 1.11.1. Linear Congruential Random Numbers -- 1.12. Frequency Analysis -- 1.13. Lab/tutorial -- 2.1. Introduction -- 2.1.1. Early Days -- 2.1.2. Encryption -- 2.1.3. Secure Communications -- 2.1.4. Modern Methods -- 2.2. Key-based Cryptography -- 2.2.1. Computation Difficulty -- 2.2.2. Stream Encryption and Block Encryption -- 2.2.3. Padding -- 2.3. Brute-Force Analysis -- 2.4. Adding Salt -- 2.4.1. Cipher Block Chaining CBC -- 2.4.2. Cipher Feedback (CFB) -- 2.4.3. Output Feedback (OFB) -- 2.4.4. Counter Mode -- 2.4.5. CBC Example -- 2.5. AES -- 2.5.1. Substitution Bytes (S-box) -- 2.5.2. Shift Row Transformation -- 2.5.3. Mix Column Transformation -- 2.5.4. Add Round Key Transformation -- 2.6. Secret-Key Encryption -- 2.6.1. DES/3-DES -- 2.6.2. RC4 -- 2.6.3. AES/Rijndael -- 2.6.4. IDEA -- 2.6.5. RC5 -- 2.6.6. Skipjack -- 2.6.7. Blowfish -- 2.6.8. Twofish -- 2.6.9. Camellia -- 2.6.10. XTEA -- 2.7. Key Entropy -- 2.8. OpenSSL -- 2.9. Pohlog-Hellman -- 2.10. Lab/tutorial -- 3.1. Introduction -- 3.2. Hashing Methods -- 3.3. Problems with Hashes -- 3.3.1. Hash Cracking -- 3.4. Salting the Hash Value -- 3.5. Common Hashing Methods -- 3.5.1. LM Hashing -- 3.5.2. APR1 (MD5 with Salt) -- 3.5.3. SHA 1, SHA256 and SHA512 -- 3.5.4. PHPass -- 3.5.5. Non-Cryptographic Hashes -- 3.6. Authenticating the Sender -- 3.7. HMAC (Hash Message Authentication Code) -- 3.8. Password Hashing -- 3.9. Password Cracking -- 3.10. One Time Passwords -- 3.11. Time Stamp Protocol -- 3.12. Winnowing and Chaffing -- 3.13. SHA-3 -- 3.14. Lab/Tutorial -- References -- 4.1. Introduction -- 4.2. RSA -- 4.3. Elliptic Curve Ciphers (ECC) -- 4.4. ElGamal -- 4.5. Cramer-Shoup -- 4.6. Paillier Cryptosystem -- 4.7. Knapsack Encryption -- 4.8. Identity-Based Encryption -- 4.9. Lab/Tutorial -- Reference -- 5.1. Introduction -- 5.2. Diffie-Hellman Key Exchange -- 5.3. Creating the Generator -- 5.4. Diffie-Hellman Examples -- 5.5. Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6. (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7. Diffie-Hellman Weaknesses -- 5.8. Using the Public Key to Pass a Secret Key -- 5.9. Lab/Tutorial -- 6.1. Introduction -- 6.2. Methods of Authentication -- 6.3. Digital Certificates and PKI -- 6.3.1. PM and Trust -- 6.3.2. Digital Certificate Types -- 6.3.3. Digital Certificate Reader -- 6.4. Key and Certificate Management -- 6.5. Creating a Signed Certificate -- 6.6. Digital Certificate Passing -- 6.7. Email Encryption -- 6.8. Kerberos -- 6.9. Kerberos Key Sharing -- 6.10. Lab/Tutorial -- 7.1. Introduction -- 7.2. SSL/TLS Connections -- 7.3. SSUFLS Handshaking -- 7.4. SSL Risks -- 7.5. VPN Tunnels -- 7.6. IKE -- 7.6.1. Phase 1 -- 7.6.2. Phase 2 -- 7.7. Tor -- 7.7.1. Tor Encryption -- 7.7.2. Examining Tor Traffic -- 7.8. Lab/Tutorial -- References -- 8.1. Introduction -- 8.2. Key Escrow -- 8.3. Cracking the Code -- 8.4. RSA Cracking -- 8.4.1. RSA Crack with Different e Value -- 8.4.2. Cracking RSA by Factorizing N -- 8.4.3. When Me Is less than N -- 8.4.4. RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5. Chosen Cipher Attack -- 8.4.6. Blinding Attack -- 8.4.7. Bleichenbacher's Attack -- 8.5. AES Cracking -- 8.5.1. AES Copy-and-Paste -- 8.5.2. AES (Brute Force) -- 8.5.3. AES Cracking with Non-Random Numbers -- 8.6. Digital Certificate Cracking -- 8.7. Lab/Tutorial -- References -- 9.1. Introduction -- 9.2. Light-Weight Symmetric Methods -- 9.3. Light-Weight Hashing -- 9.4. Other Light Weight Ciphers -- 9.5. Secret Shares -- 9.6. Post Quantum Cryptography -- 9.7. Lab/Tutorial -- References -- 10.1. Introduction -- 10.2. Bitcoins, Blockchain and Miners -- 10.2.1. Bitcoin Transactions -- 10.2.2. Mining Process -- 10.3. Ethereum -- 10.3.1. Gas -- 10.3.2. Practical Implementation of Ethereum -- 10.3.3. Smart Contracts -- 10.4. Lab/Tutorial -- References -- 11.1. Introduction -- 11.2. ZKP: Discrete Logs -- 11.3. Commutative Encryption -- 11.4. Graphs and Hamiltonian Cycles -- 11.5. Feige-Fiat-Shamir -- 11.6. Non-interactive Random Oracle Access for Zero-knowledge Proof -- 11.7. Fair Coin Flip -- 11.8. ZKP: Paillier -- 11.9. Oblivious Transfer (OT) -- 11.10. Scrambled Circuits -- 11.11. Millionaire's Problem -- 11.12. RAPPOR -- 11.13. Secure Function Evaluation (SFE) -- 11.14. Secure Remote Password (SRP) Protocol -- 11.15. Lab/Tutorial -- Reference -- 12.1. Introduction -- 12.2. RC4 -- 12.3. WEP -- 12.4. Wi-fi Standards -- 12.5. WPA and WPA-2 -- 12.6. WPA-2 Handshaking -- 12.7. Cracking WPA-2 PSK -- 12.8. Stream Ciphers -- 12.9. A5 Ciphers -- 12.9.1. Practical Systems -- 12.9.2. A5/3 -- 12.10. Lab/tutorial -- References
Summary Annotation Cryptography has proven to be one of the most contentious areas in modern society. For some, it protects the rights of individuals to privacy and security. For others, it puts up barriers against the protection of our society. This book aims to develop a deep understanding of cryptography and provide understanding of how privacy, identity provision, and integrity can be enhanced with the usage of encryption. The book has many novel features including: full provision of web-based material on almost every topic covered; provision of additional on-line material such as videos, source code, and labs; and coverage of emerging areas such as Blockchain, Light-weight Cryptography, and Zero-knowledge Proofs. Key areas covered include: Fundamentals of Encryption, Public Key Encryption, Symmetric Key Encryption, Hashing Methods, Key Exchange Methods, Digital Certificates and Authentication, Tunneling, Crypto Cracking, Light-weight Cryptography, Blockchain, and Zero-knowledge Proofs. This book provides extensive support through the associated website of: http: //asecuritysite.com/encryption
Notes William Buchanan
Online resource; title from digital title page (viewed on November 09, 2017)
Print version record
Subject Data encryption (Computer science)
COMPUTERS -- Security -- Cryptography.
SCIENCE / Energy
Data encryption (Computer science)
Form Electronic book
ISBN 9788793609143
8793609140
8793379102
9788793379107
9781003337751
1003337759
9781000792126
1000792129
9781000795349
1000795349