Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover Page
Title Page
Copyright Page
Preface
Contents
List of Figures
List of Tables
Part I Setting the Scene
1. Basic Principles
1.1 Why information security?
1.2 Security risks
1.3 Security services
1.4 Fundamentals of cryptosystems
1.5 Cryptosystem security assumptions
1.6 Breaking cryptosystems
1.7 Summary
1.8 Further reading
1.9 Activities
2. Historical Cryptosystems
2.1 Monoalphabetic ciphers
2.2 Historical advances
2.3 Summary
2.4 Further reading
2.5 Activities
3. Theoretical versus Practical Security
3.1 Theoretical security
3.2 Practical security
3.3 Summary
3.4 Further reading
3.5 Activities
Part II The Cryptographic Toolkit 105
4. Symmetric Encryption
4.1 Classification of symmetric encryption algorithms
4.2 Stream ciphers
4.3 Block ciphers
4.4 The Data Encryption Standard
4.5 The Advanced Encryption Standard
4.6 Modes of operation
4.7 Summary
4.8 Further reading
4.9 Activities
5. Public-Key Encryption
5.1 Public-key cryptography
5.2 RSA
5.3 ElGamal and elliptic curve variants
5.4 Comparison of RSA, ElGamal and elliptic curve variants
5.5 Uses in practice of public-key cryptosystems
5.6 Summary
5.7 Further reading
5.8 Activities
6. Data Integrity
6.1 Different levels of data integrity
6.2 Hash functions
6.3 Message authentication codes
6.4 Summary
6.5 Further reading
6.6 Activities
7. Digital Signature Schemes
7.1 Digital signatures
7.2 Non-repudiation using symmetric techniques
7.3 Digital signature schemes based on RSA
7.4 Digital signature schemes in practice
7.5 Summary
7.6 Further reading
7.7 Activities
8. Entity Authentication
8.1 Random number generation
8.2 Providing freshness
8.3 Fundamentals of entity authentication
8.4 Passwords
8.5 Dynamic password schemes
8.6 Zero-knowledge mechanisms
8.7 Summary
8.8 Further reading
8.9 Activities
9. Cryptographic Protocols
9.1 Protocol basics
9.2 From objectives to a protocol
9.3 Analysing a simple protocol
9.4 Authentication and key establishment protocols
9.5 Summary
9.6 Further reading
9.7 Activities
Part III Key Management 325
10. Key Management
10.1 Key management fundamentals
10.2 Key lengths and lifetimes
10.3 Key generation
10.4 Key establishment
10.5 Key storage
10.6 Key usage
10.7 Governing key management
10.8 Summary
10.9 Further reading
10.10 Activities
11. Public-Key Management
11.1 Certification of public keys
11.2 The certificate lifecycle
11.3 Public-key management models
11.4 Alternative approaches
11.5 Summary
11.6 Further reading
11.7 Activities
Part IV Applications 409
12. Cryptographic Applications
12.1 Cryptography on the Internet
12.2 Cryptography for wireless local area networks
12.3 Cryptography for mobile telecommunications
12.4 Cryptography for secure payment card transactions
12.5 Cryptography for video broadcasting
12.6 Cryptography for identity cards
12.7 Cryptography for home users
12.8 Summary
12.9 Further reading
12.10 Activities
13. Closing Remarks
Mathematics Appendix
A.1 Decimal, binary and hex
A.2 Modular arithmetic
A.3 The mathematics of RSA
A.4 The mathematics of ElGamal
A.5 Further reading
Bibliography
Index
← Prev
Back
Next →
← Prev
Back
Next →