Cryptography [electronic resource] / William J. Buchanan, OBE.
Annotation
Saved in:
Online Access: |
Full Text (via Taylor & Francis) |
---|---|
Main Author: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Gistrup, Denmark :
River Publishers,
[2017]
|
Series: | River Publishers series in information science and technology.
|
Subjects: |
Table of Contents:
- Machine generated contents note: 1.1. Introduction
- 1.2. Simple Cipher Methods
- 1.2.1. Morse Code
- 1.2.2. Pigpen
- 1.2.3. Rail Code
- 1.2.4. BIFID Cipher
- 1.2.5. Playfair
- 1.2.6. Homophonic Substitution Code
- 1.2.7. Caesar Coding and Scrambled Alphabet
- 1.2.8. Vigenere Cipher
- 1.2.9. One-Time Pad (OTP)
- 1.3. Encoding Methods
- 1.3.1. Hexadecimal and Base-64
- 1.4. Huffman Coding and Lempel-Viz Welsh (LZW)
- 1.5. Data Integrity (CRC-32)
- 1.6. Little Endian or Big Endian
- 1.7. Introduction to Probability and Number Theory
- 1.7.1. Combinations and Permutations
- 1.7.2. Probability Theory
- 1.7.3. Set Theory
- 1.7.4. Number Representations
- 1.7.5. Logarithms
- 1.8. Prime Numbers
- 1.9. Encryption Operators (mod, EX-OR and shift)
- 1.9.1. Mod Operator
- 1.9.2. Shift-Operators
- 1.9.3. Integers and Big Integers
- 1.9.4. X-OR
- 1.9.5. Modulo-2 Operations
- 1.10. GCD
- 1.11. Random Number Generators
- 1.11.1. Linear Congruential Random Numbers
- 1.12. Frequency Analysis
- 1.13. Lab/tutorial
- 2.1. Introduction
- 2.1.1. Early Days
- 2.1.2. Encryption
- 2.1.3. Secure Communications
- 2.1.4. Modern Methods
- 2.2. Key-based Cryptography
- 2.2.1. Computation Difficulty
- 2.2.2. Stream Encryption and Block Encryption
- 2.2.3. Padding
- 2.3. Brute-Force Analysis
- 2.4. Adding Salt
- 2.4.1. Cipher Block Chaining CBC
- 2.4.2. Cipher Feedback (CFB)
- 2.4.3. Output Feedback (OFB)
- 2.4.4. Counter Mode
- 2.4.5. CBC Example
- 2.5. AES
- 2.5.1. Substitution Bytes (S-box)
- 2.5.2. Shift Row Transformation
- 2.5.3. Mix Column Transformation
- 2.5.4. Add Round Key Transformation
- 2.6. Secret-Key Encryption
- 2.6.1. DES/3-DES
- 2.6.2. RC4
- 2.6.3. AES/Rijndael
- 2.6.4. IDEA
- 2.6.5. RC5
- 2.6.6. Skipjack
- 2.6.7. Blowfish
- 2.6.8. Twofish
- 2.6.9. Camellia
- 2.6.10. XTEA
- 2.7. Key Entropy
- 2.8. OpenSSL
- 2.9. Pohlog-Hellman
- 2.10. Lab/tutorial
- 3.1. Introduction
- 3.2. Hashing Methods
- 3.3. Problems with Hashes
- 3.3.1. Hash Cracking
- 3.4. Salting the Hash Value
- 3.5. Common Hashing Methods
- 3.5.1. LM Hashing
- 3.5.2. APR1 (MD5 with Salt)
- 3.5.3. SHA 1, SHA256 and SHA512
- 3.5.4. PHPass
- 3.5.5. Non-Cryptographic Hashes
- 3.6. Authenticating the Sender
- 3.7. HMAC (Hash Message Authentication Code)
- 3.8. Password Hashing
- 3.9. Password Cracking
- 3.10. One Time Passwords
- 3.11. Time Stamp Protocol
- 3.12. Winnowing and Chaffing
- 3.13. SHA-3
- 3.14. Lab/Tutorial
- References
- 4.1. Introduction
- 4.2. RSA
- 4.3. Elliptic Curve Ciphers (ECC)
- 4.4. ElGamal
- 4.5. Cramer-Shoup
- 4.6. Paillier Cryptosystem
- 4.7. Knapsack Encryption
- 4.8. Identity-Based Encryption
- 4.9. Lab/Tutorial
- Reference
- 5.1. Introduction
- 5.2. Diffie-Hellman Key Exchange
- 5.3. Creating the Generator
- 5.4. Diffie-Hellman Examples
- 5.5. Ephemeral Diffie-Hellman with RSA (DHE-RSA)
- 5.6. (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE)
- 5.7. Diffie-Hellman Weaknesses
- 5.8. Using the Public Key to Pass a Secret Key
- 5.9. Lab/Tutorial
- 6.1. Introduction
- 6.2. Methods of Authentication
- 6.3. Digital Certificates and PKI
- 6.3.1. PM and Trust
- 6.3.2. Digital Certificate Types
- 6.3.3. Digital Certificate Reader
- 6.4. Key and Certificate Management
- 6.5. Creating a Signed Certificate
- 6.6. Digital Certificate Passing
- 6.7. Email Encryption
- 6.8. Kerberos
- 6.9. Kerberos Key Sharing
- 6.10. Lab/Tutorial
- 7.1. Introduction
- 7.2. SSL/TLS Connections
- 7.3. SSUFLS Handshaking
- 7.4. SSL Risks
- 7.5. VPN Tunnels
- 7.6. IKE
- 7.6.1. Phase 1
- 7.6.2. Phase 2
- 7.7. Tor
- 7.7.1. Tor Encryption
- 7.7.2. Examining Tor Traffic
- 7.8. Lab/Tutorial
- References
- 8.1. Introduction
- 8.2. Key Escrow
- 8.3. Cracking the Code
- 8.4. RSA Cracking
- 8.4.1. RSA Crack with Different e Value
- 8.4.2. Cracking RSA by Factorizing N
- 8.4.3. When Me Is less than N
- 8.4.4. RSA Crack with Chinese Remainder Theory (CRT)
- 8.4.5. Chosen Cipher Attack
- 8.4.6. Blinding Attack
- 8.4.7. Bleichenbacher's Attack
- 8.5. AES Cracking
- 8.5.1. AES Copy-and-Paste
- 8.5.2. AES (Brute Force)
- 8.5.3. AES Cracking with Non-Random Numbers
- 8.6. Digital Certificate Cracking
- 8.7. Lab/Tutorial
- References
- 9.1. Introduction
- 9.2. Light-Weight Symmetric Methods
- 9.3. Light-Weight Hashing
- 9.4. Other Light Weight Ciphers
- 9.5. Secret Shares
- 9.6. Post Quantum Cryptography
- 9.7. Lab/Tutorial
- References
- 10.1. Introduction
- 10.2. Bitcoins, Blockchain and Miners
- 10.2.1. Bitcoin Transactions
- 10.2.2. Mining Process
- 10.3. Ethereum
- 10.3.1. Gas
- 10.3.2. Practical Implementation of Ethereum
- 10.3.3. Smart Contracts
- 10.4. Lab/Tutorial
- References
- 11.1. Introduction
- 11.2. ZKP: Discrete Logs
- 11.3. Commutative Encryption
- 11.4. Graphs and Hamiltonian Cycles
- 11.5. Feige-Fiat-Shamir
- 11.6. Non-interactive Random Oracle Access for Zero-knowledge Proof
- 11.7. Fair Coin Flip
- 11.8. ZKP: Paillier
- 11.9. Oblivious Transfer (OT)
- 11.10. Scrambled Circuits
- 11.11. Millionaire's Problem
- 11.12. RAPPOR
- 11.13. Secure Function Evaluation (SFE)
- 11.14. Secure Remote Password (SRP) Protocol
- 11.15. Lab/Tutorial
- Reference
- 12.1. Introduction
- 12.2. RC4
- 12.3. WEP
- 12.4. Wi-fi Standards
- 12.5. WPA and WPA-2
- 12.6. WPA-2 Handshaking
- 12.7. Cracking WPA-2 PSK
- 12.8. Stream Ciphers
- 12.9. A5 Ciphers
- 12.9.1. Practical Systems
- 12.9.2. A5/3
- 12.10. Lab/tutorial
- References.