My Account Log in

3 options

Cryptography / William J. Buchanan.

EBSCOhost Academic eBook Collection (North America) Available online

View online

EBSCOhost eBook Community College Collection Available online

View online

Ebook Central Academic Complete Available online

View online
Format:
Book
Author/Creator:
Buchanan, William, author.
Series:
River Publishers series in security and digital forensics.
River Publishers series in security and digital forensics
Language:
English
Subjects (All):
Cryptography.
Physical Description:
1 online resource (426 pages) : illustrations, tables.
Edition:
1st ed.
Place of Publication:
Denmark : River Publishers, [2017]
Summary:
This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.
Contents:
Cover
Half Title
Series Page
Title Page
Copyright Page
Table of Contents
Acknowledgement
List of Figures
List of Tables
Introduction
1: Ciphers and Fundamentals
1.1 Introduction
1.2 Simple Cipher Methods
1.2.1 Morse Code
1.2.2 Pigpen
1.2.3 Rail Code
1.2.4 BIFID Cipher
1.2.5 Playfair
1.2.6 Homophonic Substitution Code
1.2.7 Caesar Coding and Scrambled Alphabet
1.2.8 Vigenère Cipher
1.2.9 One-Time Pad (OTP)
1.3 Encoding Methods
1.3.1 Hexadecimal and Base-64
1.4 Huffman Coding and Lempel-Viz Welsh (LZW)
1.5 Data Integrity (CRC-32)
1.6 Little Endian or Big Endian
1.7 Introduction to Probability and Number Theory
1.7.1 Combinations and Permutations
1.7.2 Probability Theory
1.7.3 Set Theory
1.7.4 Number Representations
1.7.5 Logarithms
1.8 Prime Numbers
1.9 Encryption Operators (Mod, EX-OR and Shift)
1.9.1 Mod Operator
1.9.2 Shift-Operators
1.9.3 Integers and Big Integers
1.9.4 X-OR
1.9.5 Modulo-2 Operations
1.10 GCD
1.11 Random Number Generators
1.11.1 Linear Congruential Random Numbers
1.12 Frequency Analysis
1.13 Lab/Tutorial
2: Secret Key Encryption
2.1 Introduction
2.1.1 Early Days
2.1.2 Encryption
2.1.3 Secure Communications
2.1.4 Modern Methods
2.2 Key-Based Cryptography
2.2.1 Computation Difficulty
2.2.2 Stream Encryption and Block Encryption
2.2.3 Padding
2.3 Brute-Force Analysis
2.4 Adding Salt
2.4.1 Cipher Block Chaining CBC
2.4.2 Cipher Feedback (CFB)
2.4.3 Output Feedback (OFB)
2.4.4 Counter Mode
2.4.5 CBC Example
2.5 AES
2.5.1 Substitution Bytes (S-Box)
2.5.2 Shift Row Transformation
2.5.3 Mix Column Transformation
2.5.4 Add Round Key Transformation
2.6 Secret-Key Encryption
2.6.1 DES/3-DES
2.6.2 RC4
2.6.3 AES/Rijndael
2.6.4 IDEA.
2.6.5 RC5
2.6.6 Skipjack
2.6.7 Blowfish
2.6.8 Twofish
2.6.9 Camellia
2.6.10 XTEA
2.7 Key Entropy
2.8 OpenSSL
2.9 Pohlog-Hellman
2.10 Lab/Tutorial
3: Hashing
3.1 Introduction
3.2 Hashing Methods
3.3 Problems with Hashes
3.3.1 Hash Cracking
3.4 Salting the Hash Value
3.5 Common Hashing Methods
3.5.1 LM Hashing
3.5.2 APR1 (MD5 with Salt)
3.5.3 SHA1, SHA256 and SHA512
3.5.4 PHPass
3.5.5 Non-Cryptographic Hashes
3.6 Authenticating the Sender
3.7 HMAC (Hash Message Authentication Code)
3.8 Password Hashing
3.9 Password Cracking
3.10 One Time Passwords
3.11 Time Stamp Protocol
3.12 Winnowing and Chaffing
3.13 SHA-3
3.14 Lab/Tutorial
References
4: Public Key
4.1 Introduction
4.2 RSA
4.3 Elliptic Curve Ciphers (ECC)
4.4 ElGamal
4.5 Cramer-Shoup
4.6 Paillier Cryptosystem
4.7 Knapsack Encryption
4.8 Identity-Based Encryption
4.9 Lab/Tutorial
Reference
5: Key Exchange
5.1 Introduction
5.2 Diffie-Hellman Key Exchange
5.3 Creating the Generator
5.4 Diffie-Hellman Examples
5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA)
5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE)
5.7 Diffie-Hellman Weaknesses
5.8 Using the Public Key to Pass a Secret Key
5.9 Lab/Tutorial
6: Authentication and Digital Certificates
6.1 Introduction
6.2 Methods of Authentication
6.3 Digital Certificates and PKI
6.3.1 PKI and Trust
6.3.2 Digital Certificate Types
6.3.3 Digital Certificate Reader
6.4 Key and Certificate Management
6.5 Creating a Signed Certificate
6.6 Digital Certificate Passing
6.7 Email Encryption
6.8 Kerberos
6.9 Kerberos Key Sharing
6.10 Lab/Tutorial
7: Tunneling
7.1 Introduction
7.2 SSL/TLS Connections
7.3 SSL/TLS Handshaking
7.4 SSL Risks
7.5 VPN Tunnels.
7.6 IKE
7.6.1 Phase 1
7.6.2 Phase 2
7.7 Tor
7.7.1 Tor Encryption
7.7.2 Examining Tor Traffic
7.8 Lab/Tutorial
8: Crypto Cracking
8.1 Introduction
8.2 Key Escrow
8.3 Cracking the Code
8.4 RSA Cracking
8.4.1 RSA Crack with Different e Value
8.4.2 Cracking RSA by Factorizing N
8.4.3 When Me is less than N
8.4.4 RSA Crack with Chinese Remainder Theory (CRT)
8.4.5 Chosen Cipher Attack
8.4.6 Blinding Attack
8.4.7 Bleichenbacher's Attack
8.5 AES Cracking
8.5.1 AES Copy-and-Paste
8.5.2 AES (Brute Force)
8.5.3 AES Cracking with Non-Random Numbers
8.6 Digital Certificate Cracking
8.7 Lab/Tutorial
9: Light-Weight Cryptography and Other Methods
9.1 Introduction
9.2 Light-Weight Symmetric Methods
9.3 Light-Weight Hashing
9.4 Other Light Weight Ciphers
9.5 Secret Shares
9.6 Post Quantum Cryptography
9.7 Lab/Tutorial
10: Blockchain and Crypto-Currency
10.1 Introduction
10.2 Bitcoins, Blockchain and Miners
10.2.1 Bitcoin Transactions
10.2.2 Mining Process
10.3 Ethereum
10.3.1 Gas
10.3.2 Practical Implementation of Ethereum
10.3.3 Smart Contracts
10.4 Lab/Tutorial
11: Zero-Knowledge Proof (ZKP) and Privacy Preserving
11.1 Introduction
11.2 ZKP: Discrete Logs
11.3 Commutative Encryption
11.4 Graphs and Hamiltonian Cycles
11.5 Feige-Fiat-Shamir
11.6 Non-Interactive Random Oracle Access for Zero-Knowledge Proof
11.7 A Fair Coin Flip
11.8 ZKP: Paillier
11.9 Oblivious Transfer (OT)
11.10 Scrambled Circuits
11.11 Millionaire's Problem
11.12 RAPPOR
11.13 Secure Function Evaluation (SFE)
11.14 Secure Remote Password (SRP) Protocol
11.15 Lab/Tutorial
12: Wireless Cryptography and Stream Ciphers
12.1 Introduction
12.2 RC4.
12.3 WEP
12.4 Wi-Fi Standards
12.5 WPA and WPA-2
12.6 WPA-2 Handshaking
12.7 Cracking WPA-2 PSK
12.8 Stream Ciphers
12.9 A5 Ciphers
12.9.1 Practical Systems
12.9.2 A5/3
12.10 Lab/Tutorial
Appendix A
Index
About the Author.
Notes:
Includes index.
Includes bibliographical references at the end of each chapters and index.
Description based on print version record.
ISBN:
1-000-79212-9
1-00-333775-9
1-003-33775-9
1-000-79534-9
87-93609-14-0
9781003337751
OCLC:
1005010397
Publisher Number:
9788793379107

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account