Atjaunināt sīkdatņu piekrišanu

E-grāmata: Modern Cryptography: Applied Mathematics for Encryption and Information Security

3.91/5 (21 ratings by Goodreads)
  • Formāts: 608 pages
  • Izdošanas datums: 09-Oct-2015
  • Izdevniecība: McGraw-Hill Education
  • Valoda: eng
  • ISBN-13: 9781259588099
Citas grāmatas par šo tēmu:
  • Formāts - EPUB+DRM
  • Cena: 54,10 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: 608 pages
  • Izdošanas datums: 09-Oct-2015
  • Izdevniecība: McGraw-Hill Education
  • Valoda: eng
  • ISBN-13: 9781259588099
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

A Practical Guide to Cryptography Principles and Security Practices

Employ cryptography in real-world security situations using the hands-on information contained in this book. InfoSec expert Chuck Easttom lays out essential math skills and fully explains how to implement cryptographic algorithms in today’s data protection landscape. Find out how to use ciphers and hashes, generate random keys, handle VPN and WiFi security, and encrypt VoIP, Email, and Web communications.Modern Cryptography: Applied Mathematics for Encryption and Information Security covers cryptanalysis, steganography, and cryptographic backdoors.

  • Learn the necessary number theory, discrete math, and algebra
  • Employ symmetric ciphers, including Feistel and substitution-permutation ciphers
  • Understand asymmetric cryptography algorithms
  • Design s-boxes that maximize output non-linearity
  • Deploy cryptographic hashes
  • Create cryptographic keys using pseudo random number generators
  • Encrypt Web traffic using SSL/TLS
  • Secure VPN, WiFi, and SSH communications
  • Work with cryptanalysis and steganography
  • Explore government, military, and intelligence agency applications
Acknowledgments xvii
Introduction xix
Part I Foundations
Chapter 1 History of Cryptography to the 1800s
1(20)
Why Study Cryptography?
1(1)
What Is Cryptography?
2(2)
Substitution Ciphers
4(12)
The Caesar Cipher
4(2)
Atbash Cipher
6(1)
Affine Ciphers
7(1)
Homophonic Substitution
8(1)
Polybius Cipher
9(1)
Null Cipher
10(1)
Multi-Alphabet Substitution
11(2)
Devices
13(3)
Book Ciphers
16(1)
Transposition Ciphers
16(2)
Reverse Order
16(1)
Rail Fence Cipher
16(1)
Geometric Shape Cipher
17(1)
Columnar Cipher
18(1)
Combinations
18(1)
Conclusions
19(1)
Test Your Knowledge
19(1)
Answers
20(1)
Endnotes
20(1)
Chapter 2 History of Cryptography from the 1800s
21(20)
Cryptography Marches On
21(13)
Playfair Cipher
22(2)
Two-Square Cipher
24(1)
Four-Square Cipher
25(2)
Hill Cipher
27(2)
ADFGX and ADFGVX Ciphers
29(2)
Bifid Cipher
31(1)
Gronsfeld Cipher
32(1)
Vernam Cipher
32(2)
Cryptography Comes of Age
34(4)
Enigma
34(2)
SIGABA
36(1)
Lorenz Cipher
37(1)
IFF Systems
37(1)
The NSA: The Early Years
38(1)
Conclusions
39(1)
Test Your Knowledge
40(1)
Answers
40(1)
Endnotes
40(1)
Chapter 3 Basic Information Theory
41(20)
The Information Age
41(2)
Claude Shannon
43(1)
Theorem 1: Shannon's Source Coding Theorem
44(1)
Theorem 2: Noisy Channel Theorem
44(1)
Core Concepts of Cryptography
44(7)
Information Entropy
44(3)
Quantifying Information
47(1)
Confusion and Diffusion
48(1)
Avalanche
49(1)
Hamming Distance
49(1)
Hamming Weight
50(1)
Kerckhoffs's Principle/Shannon's Maxim
50(1)
Scientific and Mathematical Theories
51(4)
What Is a Mathematical Theory?
52(1)
The Scientific Process
53(1)
A Scientific Theory
53(2)
Binary Math
55(4)
Converting
56(1)
Binary Operations
57(2)
Conclusions
59(1)
Test Your Knowledge
59(1)
Answers
59(1)
Endnotes
59(2)
Chapter 4 Essential Number Theory and Discrete Math
61(30)
Number Systems
62(2)
Natural Numbers
62(1)
Negative Numbers
63(1)
Rational and Irrational Numbers
63(1)
Real Numbers
63(1)
Imaginary Numbers
64(1)
Prime Numbers
64(5)
Finding Prime Numbers
65(4)
Relatively Prime, or Co-prime, Numbers
69(1)
Important Operations
70(4)
Divisibility Theorems
70(1)
Summation
70(1)
Logarithms
71(1)
Modulus Operations
72(2)
Famous Number Theorists and Their Contributions
74(2)
Fibonacci
74(1)
Fermat
75(1)
Euler
75(1)
Goldbach
76(1)
Discrete Mathematics
76(12)
Set Theory
76(3)
Logic
79(4)
Combinatorics
83(3)
Graph Theory
86(2)
Conclusions
88(1)
Test Your Knowledge
89(1)
Answers
89(1)
Endnote
89(2)
Chapter 5 Essential Algebra
91(26)
Abstract Algebraic Structures
92(4)
Groups
93(1)
Rings
94(1)
Fields
95(1)
Diophantine Equations
96(1)
Matrix Math
97(5)
Matrix Addition and Multiplication
97(2)
Matrix Transposition
99(1)
Submatrix
100(1)
Identity Matrix
100(2)
Algorithms
102(7)
Basic Algorithms
102(1)
Sorting Algorithms
103(4)
P vs. NP
107(2)
History Highlights
109(4)
Ancient Mediterranean Algebra
110(1)
Ancient Chinese Algebra
111(1)
Ancient Arabic Algebra
111(1)
Important Mathematicians
111(2)
Conclusions
113(1)
Test Your Knowledge
114(1)
Answers
115(1)
Endnote
115(2)
Part II Symmetric Ciphers and Hashes
Chapter 6 Feistel Networks
117(26)
Cryptographic Keys
118(1)
Feistel Function
119(2)
Unbalanced Feistel
121(1)
Pseudo-Hadamard Transform
121(1)
MDS Matrix
122(1)
Lucifer
122(2)
DES
124(3)
3DES
127(1)
S-Box and P-Box
127(2)
GOST
129(1)
Blowfish
130(2)
Twofish
132(1)
Skipjack
133(2)
CAST
135(1)
FEAL
135(1)
MARS
135(1)
TEA
136(2)
LOKI97
138(1)
Camellia
138(1)
ICE
138(1)
Simon
138(1)
Symmetric Methods
139(1)
ECB
139(1)
CBC
139(1)
PCBC
140(1)
CFB
140(1)
Conclusions
140(1)
Test Your Knowledge
140(1)
Answers
141(1)
Endnotes
141(2)
Chapter 7 Substitution-Permutation Networks
143(18)
Replacing DES
143(1)
Advanced Encryption Standard
144(4)
Rijndael Steps
144(1)
Rijndael Outline
145(1)
Rijndael S-Box
146(1)
Rijndael Key Schedule
146(2)
Serpent Algorithm
148(1)
Serpent S-Boxes and Key Schedule
148(1)
The Serpent Algorithm
149(1)
Square
149(1)
SHARK
149(1)
SAFER Ciphers
150(2)
The Round Function
151(1)
Key Schedule
152(1)
KHAZAD
152(1)
NESSIE
152(1)
Stream Ciphers
153(5)
LFSR
154(1)
RC4
154(2)
FISH
156(1)
eSTREAM
157(1)
A5
158(1)
One-Time Pad
158(1)
Conclusions
159(1)
Test Your Knowledge
159(1)
Answers
160(1)
Endnotes
160(1)
Chapter 8 S-Box Design
161(16)
Why Study S-Box Design?
161(2)
Critical to Block Ciphers
162(1)
Designing Ciphers
162(1)
Altering S-Boxes
163(1)
General Facts about S-Boxes
163(4)
Types of S-Boxes
163(2)
Design Considerations
165(2)
The DES S-Box
167(3)
The Actual S-Boxes for DES
168(2)
The Rijndael S-Box
170(5)
The Irreducible Polynomial
170(1)
Multiplicative Inverse
171(1)
Affine Transformation
172(1)
Generating the S-Box
173(1)
Changing the Rijndael S-Box
174(1)
Conclusions
175(1)
Test Your Knowledge
175(1)
Answers
176(1)
Endnotes
176(1)
Chapter 9 Cryptographic Hashes
177(16)
What Is a Cryptographic Hash?
177(2)
How Are Cryptographic Hashes Used?
179(1)
Message Integrity
179(1)
Password Storage
180(1)
Forensic Integrity
180(1)
Merkle-Damgard
180(1)
Specific Algorithms
181(9)
Checksums
181(1)
MD5
182(2)
SHA
184(3)
RIPEMD
187(1)
Tiger
187(1)
HAVAL
188(1)
Whirlpool
188(1)
Skein
188(1)
FSB
189(1)
GOST
189(1)
Attacks on Hashes
190(1)
Salt
190(1)
MAC and HMAC
191(1)
Conclusions
191(1)
Test Your Knowledge
191(1)
Answers
192(1)
Endnotes
192(1)
Part III Asymmetric Ciphers
Chapter 10 Common Algorithms
193(18)
What Is Asymmetric Cryptography?
193(5)
RSA
195(3)
The Rabin Cryptosystem
198(1)
Diffie-Hellman
198(1)
ElGamal
199(1)
MQV
200(1)
Optimal Asymmetric Encryption Padding
201(1)
Cramer-Shoup
201(1)
Applications
201(6)
Key Exchange
201(1)
Digital Signatures
201(3)
Digital Certificates
204(2)
SSL/TLS
206(1)
Homomorphic Encryption
207(1)
Conclusions
208(1)
Test Your Knowledge
208(1)
Answers
208(1)
Endnote
209(2)
Chapter 11 Elliptic Curve Cryptography
211(10)
General Overview
211(5)
What Is an Elliptic Curve?
212(1)
Basic Operations on Elliptic Curves
213(3)
The Algorithm
216(2)
ECC Variations
218(2)
ECC Diffie-Hellman
218(1)
Elliptic Curve Digital Signature Algorithm
219(1)
Conclusions
220(1)
Test Your Knowledge
220(1)
Answers
220(1)
Endnotes
220(1)
Part IV Applications
Chapter 12 Random Number Generators
221(20)
What Makes a Good PRNG?
222(6)
(Desirable) Properties of Pseudo-random Numbers
222(1)
Tests of Randomness
222(5)
Standards for PRNG
227(1)
Specific Algorithms
228(9)
Middle-Square Algorithm
228(1)
Linear Congruential Generator
229(4)
Mersenne Twister
233(1)
Blum Blum Shub
234(1)
Yarrow
235(1)
Fortuna
236(1)
Dual_EC_DRBG
236(1)
The Marsaglia CD-ROM
237(1)
Improving PRNGs
237(1)
Shuffling
237(1)
Cryptographic Hash
238(1)
Conclusions
238(1)
Test Your Knowledge
238(1)
Answers
238(1)
Endnotes
238(3)
Chapter 13 Secure Sockets Layer/Transport Layer Security Protocol
241(20)
Digital Signatures
241(3)
Direct Signature
242(1)
Arbitrated Digital Signature
243(1)
Digital Certificates
244(3)
X.509
244(2)
PGP
246(1)
Public-Key Infrastructure X.509
247(1)
SSL and TLS Protocol Basics
248(10)
History
248(1)
The Handshake Step-by-Step
249(2)
SSL/TLS Applications
251(7)
Conclusions
258(1)
Test Your Knowledge
258(1)
Answers
259(1)
Endnotes
259(2)
Chapter 14 Virtual Private Networks
261(16)
Authentication
262(4)
CHAP
263(1)
EAP
263(1)
Kerberos
264(2)
NTLM
266(1)
PPTP
266(1)
PPTP vs. PPP
266(1)
PPTP Authentication
267(1)
PPTP Encryption
267(1)
L2TP
267(1)
IPSec
268(3)
IKE Phase 1
269(1)
IKE Phase 2
270(1)
SSL/TLS
271(1)
Other Secure Communications
271(3)
SSH
271(1)
Wi-Fi Encryption
272(2)
Conclusions
274(1)
Test Your Knowledge
274(1)
Answers
274(1)
Endnotes
275(2)
Chapter 15 Military Applications
277(16)
NSA and Cryptography
278(4)
NSA Cryptographic Standards
279(3)
The Modern Role of the NSA
282(1)
U.S. Cryptography Laws and Regulations
282(1)
Cryptography in Other Nations
283(3)
International Regulations and Agreements
284(2)
Cryptography and Malware
286(4)
Weaponized Malware
287(1)
Cyber-Warfare
288(1)
TOR
288(2)
Conclusions
290(1)
Test Your Knowledge
290(1)
Answers
291(1)
Endnotes
291(2)
Chapter 16 Steganography
293(20)
Steganography Basics
293(2)
Steganography History
295(2)
Steganography Methods and Tools
297(9)
Steganographic Methods
297(2)
Steganographic Tools
299(7)
Current Uses of Steganography
306(1)
Steganalysis
307(1)
Distributed Steganography
308(3)
Total Blocks and Block Order
309(2)
Conclusions
311(1)
Test Your Knowledge
311(1)
Answers
311(1)
Endnotes
311(2)
Chapter 17 Cryptanalysis
313(16)
Classic Cryptanalysis Methods
314(2)
Frequency Analysis
314(1)
Kasiski Examination
315(1)
Modern Methods
316(4)
Linear Cryptanalysis
316(1)
Differential Cryptanalysis
317(2)
Integral Cryptanalysis
319(1)
Mod n Cryptanalysis
319(1)
Asymmetric Cryptanalysis and RSA
320(1)
General Rules for Cryptanalysis
321(1)
Rainbow Tables
322(1)
The Birthday Paradox
323(2)
Other Methods
325(1)
Other Passwords
325(1)
Related Data
326(1)
Spyware
326(1)
Side-Channel Attack
326(1)
Resources
326(1)
Conclusions
327(1)
Test Your Knowledge
327(1)
Answers
328(1)
Endnotes
328(1)
Chapter 18 Cryptographic Backdoors
329(12)
What Are Cryptographic Backdoors?
329(1)
General Properties
330(4)
Examples of Backdoors
331(3)
Other Ways to Compromise Cryptography
334(1)
Heartbleed Bug
334(1)
Key Escrow
335(1)
The Prevalence of Backdoors
335(2)
Governmental Approach
336(1)
Private Citizen/Group Approach
336(1)
Countermeasures
337(1)
Conclusions
338(1)
Test Your Knowledge
338(1)
Answers
338(1)
Endnotes
339(2)
Chapter 19 The Future of Cryptography
341(14)
Cryptography and the Cloud
341(3)
What Is the Cloud?
341(3)
Cryptography Options for the Cloud
344(1)
Homomorphic Cryptography
344(7)
RSA
345(1)
Goldwasser-Micali
346(1)
Paillier
346(5)
Quantum Cryptography
351(2)
What Is Quantum Mechanics?
352(1)
Quantum Key Distribution
352(1)
Breaking Quantum Code
353(1)
Conclusions
353(1)
Test Your Knowledge
354(1)
Answers
354(1)
Endnotes
354(1)
Appendix Implementing Cryptography 355(24)
Index 379
Chuck Easttom (Plano, TX), CISSP, CEH, CHFI, is President and Chief Consultant for CEC-Security, which specializes in IT training and litigation consulting. Chuck has more than 18 years in the IT industry with 10 years of teaching and professional training experience and 10 years in litigation support/expert witness work. Chuck hold seven provisional computer science patents and has authored 15 books, including System Forensics, Investigation And Response, Second Edition, Computer Security Fundamentals, and Computer Crime, Investigation, and the Law.