|
|
1 | (10) |
|
|
1 | (2) |
|
|
3 | (3) |
|
|
6 | (2) |
|
|
8 | (3) |
|
|
11 | (58) |
|
Elements of Number Theory |
|
|
11 | (17) |
|
Divisibility and the Euclid Algorithm |
|
|
11 | (4) |
|
Primes and the Sieve of Eratosthenes |
|
|
15 | (1) |
|
|
16 | (3) |
|
Computing Inverses in Congruences |
|
|
19 | (6) |
|
Legendre and Jacobi Symbols |
|
|
25 | (1) |
|
Chinese Remainder Theorem |
|
|
26 | (2) |
|
Algebraic Structures in Computing |
|
|
28 | (10) |
|
|
28 | (4) |
|
|
32 | (4) |
|
Computing in Galois Fields |
|
|
36 | (2) |
|
|
38 | (14) |
|
Asymptotic Behavior of Functions |
|
|
38 | (1) |
|
|
39 | (2) |
|
|
41 | (1) |
|
|
42 | (2) |
|
|
44 | (2) |
|
Complementary Problems in NP |
|
|
46 | (2) |
|
NP-Hard and #P-Complete Problems |
|
|
48 | (1) |
|
Problems Used in Cryptography |
|
|
49 | (2) |
|
Probabilistic Computations |
|
|
51 | (1) |
|
|
52 | (1) |
|
Elements of Information Theory |
|
|
52 | (14) |
|
|
53 | (2) |
|
|
55 | (2) |
|
Redundancy of the Language |
|
|
57 | (3) |
|
Key Equivocation and Unicity Distance |
|
|
60 | (2) |
|
Equivocation of a Simple Cryptographic System |
|
|
62 | (4) |
|
|
66 | (3) |
|
Private-Key Cryptosystems |
|
|
69 | (102) |
|
|
69 | (20) |
|
|
70 | (2) |
|
|
72 | (2) |
|
Monoalphabetic Substitution Ciphers |
|
|
74 | (2) |
|
|
76 | (3) |
|
Homophonic Substitution Ciphers |
|
|
79 | (2) |
|
Polyalphabetic Substitution Ciphers |
|
|
81 | (2) |
|
Cryptanalysis of Polyalphabetic Substitution Ciphers |
|
|
83 | (6) |
|
|
89 | (17) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
94 | (8) |
|
|
102 | (2) |
|
|
104 | (2) |
|
Modern Private-Key Cryptographic Algorithms |
|
|
106 | (16) |
|
Fast Encryption Algorithm (FEAL) |
|
|
106 | (1) |
|
|
106 | (4) |
|
|
110 | (2) |
|
|
112 | (5) |
|
|
117 | (4) |
|
|
121 | (1) |
|
Differential Cryptanalysis |
|
|
122 | (13) |
|
|
123 | (4) |
|
DES Round Characteristics |
|
|
127 | (2) |
|
Cryptanalysis of 4-Round DES |
|
|
129 | (2) |
|
Cryptanalysis of 6-Round DES |
|
|
131 | (3) |
|
Analysis of Other Feistel-Type Cryptosystems |
|
|
134 | (1) |
|
|
135 | (9) |
|
|
136 | (4) |
|
|
140 | (1) |
|
|
141 | (3) |
|
|
144 | (23) |
|
|
145 | (4) |
|
|
149 | (7) |
|
|
156 | (2) |
|
Propagation and Nonlinearity |
|
|
158 | (3) |
|
Constructions of Balanced Functions |
|
|
161 | (4) |
|
|
165 | (2) |
|
|
167 | (4) |
|
|
171 | (48) |
|
Concept of Public-Key Cryptography |
|
|
171 | (3) |
|
|
174 | (15) |
|
|
176 | (2) |
|
|
178 | (2) |
|
|
180 | (6) |
|
|
186 | (3) |
|
Merkle-Hellman Cryptosystem |
|
|
189 | (3) |
|
Security of Merkle-Hellman Cryptosystem |
|
|
192 | (1) |
|
|
192 | (3) |
|
Security of McEliece Cryptosystem |
|
|
194 | (1) |
|
|
195 | (1) |
|
Security of ElGamal Cryptosystem |
|
|
196 | (1) |
|
|
196 | (10) |
|
|
197 | (2) |
|
|
199 | (2) |
|
Elliptic Curve Variant of RSA |
|
|
201 | (4) |
|
Elliptic Curve Variant of ElGamal |
|
|
205 | (1) |
|
|
206 | (3) |
|
GM Probabilistic Encryption |
|
|
207 | (1) |
|
BG Probabilistic Encryption |
|
|
208 | (1) |
|
Public-Key Encryption Practice |
|
|
209 | (7) |
|
Taxonomy of Public-Key Encryption Security |
|
|
209 | (2) |
|
Generic OAEP Public-Key Cryptosystem |
|
|
211 | (2) |
|
|
213 | (1) |
|
Extended ElGamal Cryptosystem |
|
|
214 | (2) |
|
|
216 | (3) |
|
|
219 | (24) |
|
|
219 | (2) |
|
Polynomial Indistinguishability |
|
|
221 | (3) |
|
Pseudorandom Bit Generators |
|
|
224 | (8) |
|
RSA Pseudorandom Bit Generator |
|
|
225 | (2) |
|
BBS Pseudorandom Bit Generator |
|
|
227 | (5) |
|
|
232 | (1) |
|
Pseudorandom Function Generators |
|
|
233 | (5) |
|
Pseudorandom Permutation Generators |
|
|
238 | (3) |
|
Super Pseudorandom Permutation Generators |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
243 | (40) |
|
|
243 | (1) |
|
|
244 | (5) |
|
Serial and Parallel Hashing |
|
|
249 | (1) |
|
|
250 | (4) |
|
Hashing Based on Cryptosystems |
|
|
254 | (2) |
|
MD (Message Digest) Family |
|
|
256 | (19) |
|
|
257 | (5) |
|
|
262 | (2) |
|
|
264 | (4) |
|
|
268 | (5) |
|
Hashing Based on Intractable Problems |
|
|
273 | (2) |
|
|
275 | (5) |
|
|
276 | (2) |
|
MACs from Keyless Hashing |
|
|
278 | (2) |
|
|
280 | (3) |
|
|
283 | (24) |
|
Properties of Digital Signatures |
|
|
283 | (2) |
|
Generic Signature Schemes |
|
|
285 | (3) |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
|
288 | (2) |
|
|
290 | (4) |
|
|
294 | (1) |
|
|
295 | (4) |
|
|
299 | (3) |
|
|
302 | (2) |
|
|
304 | (3) |
|
|
307 | (20) |
|
|
307 | (2) |
|
Model of Authentication Systems |
|
|
309 | (8) |
|
Elements of the Theory of Games |
|
|
310 | (1) |
|
|
311 | (3) |
|
|
314 | (2) |
|
|
316 | (1) |
|
Information Theoretic Bounds |
|
|
317 | (2) |
|
|
319 | (4) |
|
A-codes in Projective Spaces |
|
|
319 | (2) |
|
A-codes and Orthogonal Arrays |
|
|
321 | (1) |
|
A-codes Based on Error Correcting Codes |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
324 | (3) |
|
|
327 | (26) |
|
|
327 | (5) |
|
|
328 | (1) |
|
|
329 | (2) |
|
|
331 | (1) |
|
|
331 | (1) |
|
|
332 | (6) |
|
Cumulative Array Construction |
|
|
334 | (3) |
|
Benaloh-Leichter Construction |
|
|
337 | (1) |
|
|
338 | (2) |
|
|
340 | (8) |
|
|
341 | (3) |
|
|
344 | (3) |
|
Non-ideal Optimal Secret Sharing |
|
|
347 | (1) |
|
|
348 | (2) |
|
|
350 | (3) |
|
Group-Oriented Cryptography |
|
|
353 | (26) |
|
Conditionally Secure Shamir Scheme |
|
|
353 | (8) |
|
Description of the Scheme |
|
|
354 | (1) |
|
|
355 | (1) |
|
Noninteractive Verification of Shares |
|
|
356 | (2) |
|
|
358 | (3) |
|
|
361 | (7) |
|
ElGamal Threshold Decryption |
|
|
361 | (2) |
|
|
363 | (3) |
|
RSA Decryption Without Dealer |
|
|
366 | (2) |
|
|
368 | (8) |
|
|
369 | (2) |
|
ElGamal Threshold Signatures |
|
|
371 | (2) |
|
|
373 | (3) |
|
|
376 | (3) |
|
Key Establishment Protocols |
|
|
379 | (30) |
|
Classical Key Transport Protocols |
|
|
381 | (2) |
|
Diffie-Hellman Key Agreement Protocol |
|
|
383 | (2) |
|
|
385 | (1) |
|
Modern Key Distribution Protocols |
|
|
385 | (8) |
|
|
387 | (3) |
|
|
390 | (2) |
|
Other Authentication Services |
|
|
392 | (1) |
|
|
393 | (5) |
|
|
394 | (1) |
|
Station-to-Station Protocol |
|
|
394 | (1) |
|
Protocols with Self-certified Public Keys |
|
|
395 | (2) |
|
|
397 | (1) |
|
Conference-Key Establishment Protocols |
|
|
398 | (3) |
|
BAN Logic of Authentication |
|
|
401 | (6) |
|
|
401 | (2) |
|
Analysis of the Needham-Schroeder Protocol |
|
|
403 | (4) |
|
|
407 | (2) |
|
Zero-Knowledge Proof Systems |
|
|
409 | (24) |
|
Interactive Proof Systems |
|
|
409 | (4) |
|
Perfect Zero-Knowledge Proofs |
|
|
413 | (8) |
|
Computational Zero-Knowledge Proofs |
|
|
421 | (3) |
|
|
424 | (6) |
|
Blobs with Unconditional Secrecy |
|
|
425 | (2) |
|
Blobs with Unconditional Binding |
|
|
427 | (1) |
|
|
428 | (2) |
|
|
430 | (3) |
|
|
433 | (26) |
|
Basic Identification Techniques |
|
|
433 | (1) |
|
|
434 | (2) |
|
|
436 | (4) |
|
|
437 | (2) |
|
|
439 | (1) |
|
Challenge-Response Identification |
|
|
440 | (3) |
|
Authentication of Shared Keys |
|
|
440 | (1) |
|
Authentication of Public Keys |
|
|
441 | (2) |
|
|
443 | (7) |
|
Fiat-Shamir Identification Protocol |
|
|
443 | (2) |
|
Feige-Fiat-Shamir Identification Protocol |
|
|
445 | (2) |
|
Guillou-Quisquater Identification Protocol |
|
|
447 | (3) |
|
|
450 | (6) |
|
Schnorr Identification Scheme |
|
|
450 | (2) |
|
Okamoto Identification Scheme |
|
|
452 | (2) |
|
Signatures from Identification Schemes |
|
|
454 | (2) |
|
|
456 | (3) |
|
|
459 | (40) |
|
|
459 | (2) |
|
Anomaly Intrusion Detection |
|
|
461 | (5) |
|
|
462 | (1) |
|
|
463 | (2) |
|
|
465 | (1) |
|
Misuse Intrusion Detection |
|
|
466 | (1) |
|
Uncertainty in Intrusion Detection |
|
|
467 | (6) |
|
|
467 | (4) |
|
|
471 | (2) |
|
Generic Intrusion Detection Model |
|
|
473 | (3) |
|
Host Intrusion Detection Systems |
|
|
476 | (4) |
|
|
476 | (2) |
|
|
478 | (1) |
|
|
479 | (1) |
|
Network Intrusion Detection Systems |
|
|
480 | (7) |
|
|
481 | (2) |
|
|
483 | (2) |
|
|
485 | (1) |
|
Cooperating Security Manager (CSM) |
|
|
485 | (2) |
|
Limitations of Current Intrusion Detection Systems |
|
|
487 | (3) |
|
|
487 | (1) |
|
|
488 | (2) |
|
The Common Intrusion Detection Framework (CIDF) |
|
|
490 | (2) |
|
Partial List of ID Systems |
|
|
492 | (5) |
|
|
497 | (2) |
|
Electronic Elections and Digital Money |
|
|
499 | (26) |
|
|
499 | (10) |
|
A Simple Electronic Election Protocol |
|
|
501 | (2) |
|
|
503 | (2) |
|
|
505 | (1) |
|
Fujioka-Okamoto-Ohta Protocol |
|
|
506 | (2) |
|
|
508 | (1) |
|
|
509 | (13) |
|
Untraceable Digital Coins |
|
|
510 | (3) |
|
Divisible Electronic Cash |
|
|
513 | (4) |
|
Brands Electronic Cash Protocol |
|
|
517 | (2) |
|
|
519 | (1) |
|
|
520 | (2) |
|
|
522 | (3) |
|
Database Protection and Security |
|
|
525 | (40) |
|
|
525 | (2) |
|
|
527 | (2) |
|
|
529 | (10) |
|
|
538 | (1) |
|
Database Machines and Architectures |
|
|
539 | (5) |
|
Experimental Back-end Database Systems |
|
|
541 | (3) |
|
|
544 | (7) |
|
Advantages and Disadvantages of Views |
|
|
546 | (2) |
|
Completeness and Consistency of Views |
|
|
548 | (1) |
|
Design and Implementations of Views |
|
|
549 | (2) |
|
Security in Distributed Databases |
|
|
551 | (3) |
|
Security in Object-Oriented Database Systems |
|
|
554 | (3) |
|
Security in Knowledge-Based Systems |
|
|
557 | (1) |
|
|
558 | (7) |
|
|
558 | (2) |
|
|
560 | (3) |
|
|
563 | (2) |
|
|
565 | (26) |
|
|
567 | (4) |
|
|
567 | (2) |
|
|
569 | (2) |
|
Discretionary Access Control |
|
|
571 | (5) |
|
|
571 | (3) |
|
Harrison-Ruzzo-Ullman Model |
|
|
574 | (2) |
|
Role-Based Access Control Model |
|
|
576 | (2) |
|
Implementations of Access Control |
|
|
578 | (13) |
|
|
578 | (3) |
|
|
581 | (1) |
|
|
582 | (2) |
|
|
584 | (3) |
|
|
587 | (4) |
|
|
591 | (40) |
|
Internet Protocol Security (IPsec) |
|
|
591 | (11) |
|
|
594 | (1) |
|
Authentication Header Protocol |
|
|
594 | (2) |
|
Encapsulating Security Payload Protocol |
|
|
596 | (1) |
|
|
597 | (4) |
|
|
601 | (1) |
|
|
602 | (9) |
|
|
602 | (2) |
|
|
604 | (2) |
|
|
606 | (3) |
|
Change Cipher Spec and Alert Protocols |
|
|
609 | (1) |
|
Cryptographic Computations |
|
|
610 | (1) |
|
|
611 | (1) |
|
|
611 | (20) |
|
What Is a Computer Virus? |
|
|
611 | (1) |
|
|
612 | (1) |
|
|
613 | (2) |
|
|
615 | (4) |
|
Macintosh Operating System |
|
|
619 | (4) |
|
|
623 | (2) |
|
|
625 | (2) |
|
Protection Against Viruses |
|
|
627 | (4) |
References |
|
631 | (34) |
Index |
|
665 | |