Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover Page Title Page Copyright Page Preface Contents List of Figures List of Tables Part I Setting the Scene
1. Basic Principles
1.1 Why information security? 1.2 Security risks 1.3 Security services 1.4 Fundamentals of cryptosystems 1.5 Cryptosystem security assumptions 1.6 Breaking cryptosystems 1.7 Summary 1.8 Further reading 1.9 Activities
2. Historical Cryptosystems
2.1 Monoalphabetic ciphers 2.2 Historical advances 2.3 Summary 2.4 Further reading 2.5 Activities
3. Theoretical versus Practical Security
3.1 Theoretical security 3.2 Practical security 3.3 Summary 3.4 Further reading 3.5 Activities
Part II The Cryptographic Toolkit 105
4. Symmetric Encryption
4.1 Classification of symmetric encryption algorithms 4.2 Stream ciphers 4.3 Block ciphers 4.4 The Data Encryption Standard 4.5 The Advanced Encryption Standard 4.6 Modes of operation 4.7 Summary 4.8 Further reading 4.9 Activities
5. Public-Key Encryption
5.1 Public-key cryptography 5.2 RSA 5.3 ElGamal and elliptic curve variants 5.4 Comparison of RSA, ElGamal and elliptic curve variants 5.5 Uses in practice of public-key cryptosystems 5.6 Summary 5.7 Further reading 5.8 Activities
6. Data Integrity
6.1 Different levels of data integrity 6.2 Hash functions 6.3 Message authentication codes 6.4 Summary 6.5 Further reading 6.6 Activities
7. Digital Signature Schemes
7.1 Digital signatures 7.2 Non-repudiation using symmetric techniques 7.3 Digital signature schemes based on RSA 7.4 Digital signature schemes in practice 7.5 Summary 7.6 Further reading 7.7 Activities
8. Entity Authentication
8.1 Random number generation 8.2 Providing freshness 8.3 Fundamentals of entity authentication 8.4 Passwords 8.5 Dynamic password schemes 8.6 Zero-knowledge mechanisms 8.7 Summary 8.8 Further reading 8.9 Activities
9. Cryptographic Protocols
9.1 Protocol basics 9.2 From objectives to a protocol 9.3 Analysing a simple protocol 9.4 Authentication and key establishment protocols 9.5 Summary 9.6 Further reading 9.7 Activities
Part III Key Management 325
10. Key Management
10.1 Key management fundamentals 10.2 Key lengths and lifetimes 10.3 Key generation 10.4 Key establishment 10.5 Key storage 10.6 Key usage 10.7 Governing key management 10.8 Summary 10.9 Further reading 10.10 Activities
11. Public-Key Management
11.1 Certification of public keys 11.2 The certificate lifecycle 11.3 Public-key management models 11.4 Alternative approaches 11.5 Summary 11.6 Further reading 11.7 Activities
Part IV Applications 409
12. Cryptographic Applications
12.1 Cryptography on the Internet 12.2 Cryptography for wireless local area networks 12.3 Cryptography for mobile telecommunications 12.4 Cryptography for secure payment card transactions 12.5 Cryptography for video broadcasting 12.6 Cryptography for identity cards 12.7 Cryptography for home users 12.8 Summary 12.9 Further reading 12.10 Activities
13. Closing Remarks Mathematics Appendix
A.1 Decimal, binary and hex A.2 Modular arithmetic A.3 The mathematics of RSA A.4 The mathematics of ElGamal A.5 Further reading
Bibliography Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion