Cryptography [electronic resource] / William J. Buchanan, OBE.

Annotation

Saved in:
Bibliographic Details
Online Access: Full Text (via Taylor & Francis)
Main Author: Buchanan, William J. (Author)
Format: Electronic eBook
Language:English
Published: Gistrup, Denmark : River Publishers, [2017]
Series:River Publishers series in information science and technology.
Subjects:
Table of Contents:
  • Machine generated contents note: 1.1. Introduction
  • 1.2. Simple Cipher Methods
  • 1.2.1. Morse Code
  • 1.2.2. Pigpen
  • 1.2.3. Rail Code
  • 1.2.4. BIFID Cipher
  • 1.2.5. Playfair
  • 1.2.6. Homophonic Substitution Code
  • 1.2.7. Caesar Coding and Scrambled Alphabet
  • 1.2.8. Vigenere Cipher
  • 1.2.9. One-Time Pad (OTP)
  • 1.3. Encoding Methods
  • 1.3.1. Hexadecimal and Base-64
  • 1.4. Huffman Coding and Lempel-Viz Welsh (LZW)
  • 1.5. Data Integrity (CRC-32)
  • 1.6. Little Endian or Big Endian
  • 1.7. Introduction to Probability and Number Theory
  • 1.7.1. Combinations and Permutations
  • 1.7.2. Probability Theory
  • 1.7.3. Set Theory
  • 1.7.4. Number Representations
  • 1.7.5. Logarithms
  • 1.8. Prime Numbers
  • 1.9. Encryption Operators (mod, EX-OR and shift)
  • 1.9.1. Mod Operator
  • 1.9.2. Shift-Operators
  • 1.9.3. Integers and Big Integers
  • 1.9.4. X-OR
  • 1.9.5. Modulo-2 Operations
  • 1.10. GCD
  • 1.11. Random Number Generators
  • 1.11.1. Linear Congruential Random Numbers
  • 1.12. Frequency Analysis
  • 1.13. Lab/tutorial
  • 2.1. Introduction
  • 2.1.1. Early Days
  • 2.1.2. Encryption
  • 2.1.3. Secure Communications
  • 2.1.4. Modern Methods
  • 2.2. Key-based Cryptography
  • 2.2.1. Computation Difficulty
  • 2.2.2. Stream Encryption and Block Encryption
  • 2.2.3. Padding
  • 2.3. Brute-Force Analysis
  • 2.4. Adding Salt
  • 2.4.1. Cipher Block Chaining CBC
  • 2.4.2. Cipher Feedback (CFB)
  • 2.4.3. Output Feedback (OFB)
  • 2.4.4. Counter Mode
  • 2.4.5. CBC Example
  • 2.5. AES
  • 2.5.1. Substitution Bytes (S-box)
  • 2.5.2. Shift Row Transformation
  • 2.5.3. Mix Column Transformation
  • 2.5.4. Add Round Key Transformation
  • 2.6. Secret-Key Encryption
  • 2.6.1. DES/3-DES
  • 2.6.2. RC4
  • 2.6.3. AES/Rijndael
  • 2.6.4. IDEA
  • 2.6.5. RC5
  • 2.6.6. Skipjack
  • 2.6.7. Blowfish
  • 2.6.8. Twofish
  • 2.6.9. Camellia
  • 2.6.10. XTEA
  • 2.7. Key Entropy
  • 2.8. OpenSSL
  • 2.9. Pohlog-Hellman
  • 2.10. Lab/tutorial
  • 3.1. Introduction
  • 3.2. Hashing Methods
  • 3.3. Problems with Hashes
  • 3.3.1. Hash Cracking
  • 3.4. Salting the Hash Value
  • 3.5. Common Hashing Methods
  • 3.5.1. LM Hashing
  • 3.5.2. APR1 (MD5 with Salt)
  • 3.5.3. SHA 1, SHA256 and SHA512
  • 3.5.4. PHPass
  • 3.5.5. Non-Cryptographic Hashes
  • 3.6. Authenticating the Sender
  • 3.7. HMAC (Hash Message Authentication Code)
  • 3.8. Password Hashing
  • 3.9. Password Cracking
  • 3.10. One Time Passwords
  • 3.11. Time Stamp Protocol
  • 3.12. Winnowing and Chaffing
  • 3.13. SHA-3
  • 3.14. Lab/Tutorial
  • References
  • 4.1. Introduction
  • 4.2. RSA
  • 4.3. Elliptic Curve Ciphers (ECC)
  • 4.4. ElGamal
  • 4.5. Cramer-Shoup
  • 4.6. Paillier Cryptosystem
  • 4.7. Knapsack Encryption
  • 4.8. Identity-Based Encryption
  • 4.9. Lab/Tutorial
  • Reference
  • 5.1. Introduction
  • 5.2. Diffie-Hellman Key Exchange
  • 5.3. Creating the Generator
  • 5.4. Diffie-Hellman Examples
  • 5.5. Ephemeral Diffie-Hellman with RSA (DHE-RSA)
  • 5.6. (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE)
  • 5.7. Diffie-Hellman Weaknesses
  • 5.8. Using the Public Key to Pass a Secret Key
  • 5.9. Lab/Tutorial
  • 6.1. Introduction
  • 6.2. Methods of Authentication
  • 6.3. Digital Certificates and PKI
  • 6.3.1. PM and Trust
  • 6.3.2. Digital Certificate Types
  • 6.3.3. Digital Certificate Reader
  • 6.4. Key and Certificate Management
  • 6.5. Creating a Signed Certificate
  • 6.6. Digital Certificate Passing
  • 6.7. Email Encryption
  • 6.8. Kerberos
  • 6.9. Kerberos Key Sharing
  • 6.10. Lab/Tutorial
  • 7.1. Introduction
  • 7.2. SSL/TLS Connections
  • 7.3. SSUFLS Handshaking
  • 7.4. SSL Risks
  • 7.5. VPN Tunnels
  • 7.6. IKE
  • 7.6.1. Phase 1
  • 7.6.2. Phase 2
  • 7.7. Tor
  • 7.7.1. Tor Encryption
  • 7.7.2. Examining Tor Traffic
  • 7.8. Lab/Tutorial
  • References
  • 8.1. Introduction
  • 8.2. Key Escrow
  • 8.3. Cracking the Code
  • 8.4. RSA Cracking
  • 8.4.1. RSA Crack with Different e Value
  • 8.4.2. Cracking RSA by Factorizing N
  • 8.4.3. When Me Is less than N
  • 8.4.4. RSA Crack with Chinese Remainder Theory (CRT)
  • 8.4.5. Chosen Cipher Attack
  • 8.4.6. Blinding Attack
  • 8.4.7. Bleichenbacher's Attack
  • 8.5. AES Cracking
  • 8.5.1. AES Copy-and-Paste
  • 8.5.2. AES (Brute Force)
  • 8.5.3. AES Cracking with Non-Random Numbers
  • 8.6. Digital Certificate Cracking
  • 8.7. Lab/Tutorial
  • References
  • 9.1. Introduction
  • 9.2. Light-Weight Symmetric Methods
  • 9.3. Light-Weight Hashing
  • 9.4. Other Light Weight Ciphers
  • 9.5. Secret Shares
  • 9.6. Post Quantum Cryptography
  • 9.7. Lab/Tutorial
  • References
  • 10.1. Introduction
  • 10.2. Bitcoins, Blockchain and Miners
  • 10.2.1. Bitcoin Transactions
  • 10.2.2. Mining Process
  • 10.3. Ethereum
  • 10.3.1. Gas
  • 10.3.2. Practical Implementation of Ethereum
  • 10.3.3. Smart Contracts
  • 10.4. Lab/Tutorial
  • References
  • 11.1. Introduction
  • 11.2. ZKP: Discrete Logs
  • 11.3. Commutative Encryption
  • 11.4. Graphs and Hamiltonian Cycles
  • 11.5. Feige-Fiat-Shamir
  • 11.6. Non-interactive Random Oracle Access for Zero-knowledge Proof
  • 11.7. Fair Coin Flip
  • 11.8. ZKP: Paillier
  • 11.9. Oblivious Transfer (OT)
  • 11.10. Scrambled Circuits
  • 11.11. Millionaire's Problem
  • 11.12. RAPPOR
  • 11.13. Secure Function Evaluation (SFE)
  • 11.14. Secure Remote Password (SRP) Protocol
  • 11.15. Lab/Tutorial
  • Reference
  • 12.1. Introduction
  • 12.2. RC4
  • 12.3. WEP
  • 12.4. Wi-fi Standards
  • 12.5. WPA and WPA-2
  • 12.6. WPA-2 Handshaking
  • 12.7. Cracking WPA-2 PSK
  • 12.8. Stream Ciphers
  • 12.9. A5 Ciphers
  • 12.9.1. Practical Systems
  • 12.9.2. A5/3
  • 12.10. Lab/tutorial
  • References.