ORPP logo

Cryptography.

Buchanan, William.

Cryptography. - 1st ed. - 1 online resource (425 pages)

Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- List of Figures -- List of Tables -- Introduction -- 1: Ciphers and Fundamentals -- 1.1 Introduction -- 1.2 Simple Cipher Methods -- 1.2.1 Morse Code -- 1.2.2 Pigpen -- 1.2.3 Rail Code -- 1.2.4 BIFID Cipher -- 1.2.5 Playfair -- 1.2.6 Homophonic Substitution Code -- 1.2.7 Caesar Coding and Scrambled Alphabet -- 1.2.8 Vigenère Cipher -- 1.2.9 One-Time Pad (OTP) -- 1.3 Encoding Methods -- 1.3.1 Hexadecimal and Base-64 -- 1.4 Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5 Data Integrity (CRC-32) -- 1.6 Little Endian or Big Endian -- 1.7 Introduction to Probability and Number Theory -- 1.7.1 Combinations and Permutations -- 1.7.2 Probability Theory -- 1.7.3 Set Theory -- 1.7.4 Number Representations -- 1.7.5 Logarithms -- 1.8 Prime Numbers -- 1.9 Encryption Operators (Mod, EX-OR and Shift) -- 1.9.1 Mod Operator -- 1.9.2 Shift-Operators -- 1.9.3 Integers and Big Integers -- 1.9.4 X-OR -- 1.9.5 Modulo-2 Operations -- 1.10 GCD -- 1.11 Random Number Generators -- 1.11.1 Linear Congruential Random Numbers -- 1.12 Frequency Analysis -- 1.13 Lab/Tutorial -- 2: Secret Key Encryption -- 2.1 Introduction -- 2.1.1 Early Days -- 2.1.2 Encryption -- 2.1.3 Secure Communications -- 2.1.4 Modern Methods -- 2.2 Key-Based Cryptography -- 2.2.1 Computation Difficulty -- 2.2.2 Stream Encryption and Block Encryption -- 2.2.3 Padding -- 2.3 Brute-Force Analysis -- 2.4 Adding Salt -- 2.4.1 Cipher Block Chaining CBC -- 2.4.2 Cipher Feedback (CFB) -- 2.4.3 Output Feedback (OFB) -- 2.4.4 Counter Mode -- 2.4.5 CBC Example -- 2.5 AES -- 2.5.1 Substitution Bytes (S-Box) -- 2.5.2 Shift Row Transformation -- 2.5.3 Mix Column Transformation -- 2.5.4 Add Round Key Transformation -- 2.6 Secret-Key Encryption -- 2.6.1 DES/3-DES -- 2.6.2 RC4 -- 2.6.3 AES/Rijndael -- 2.6.4 IDEA. 2.6.5 RC5 -- 2.6.6 Skipjack -- 2.6.7 Blowfish -- 2.6.8 Twofish -- 2.6.9 Camellia -- 2.6.10 XTEA -- 2.7 Key Entropy -- 2.8 OpenSSL -- 2.9 Pohlog-Hellman -- 2.10 Lab/Tutorial -- 3: Hashing -- 3.1 Introduction -- 3.2 Hashing Methods -- 3.3 Problems with Hashes -- 3.3.1 Hash Cracking -- 3.4 Salting the Hash Value -- 3.5 Common Hashing Methods -- 3.5.1 LM Hashing -- 3.5.2 APR1 (MD5 with Salt) -- 3.5.3 SHA1, SHA256 and SHA512 -- 3.5.4 PHPass -- 3.5.5 Non-Cryptographic Hashes -- 3.6 Authenticating the Sender -- 3.7 HMAC (Hash Message Authentication Code) -- 3.8 Password Hashing -- 3.9 Password Cracking -- 3.10 One Time Passwords -- 3.11 Time Stamp Protocol -- 3.12 Winnowing and Chaffing -- 3.13 SHA-3 -- 3.14 Lab/Tutorial -- References -- 4: Public Key -- 4.1 Introduction -- 4.2 RSA -- 4.3 Elliptic Curve Ciphers (ECC) -- 4.4 ElGamal -- 4.5 Cramer-Shoup -- 4.6 Paillier Cryptosystem -- 4.7 Knapsack Encryption -- 4.8 Identity-Based Encryption -- 4.9 Lab/Tutorial -- Reference -- 5: Key Exchange -- 5.1 Introduction -- 5.2 Diffie-Hellman Key Exchange -- 5.3 Creating the Generator -- 5.4 Diffie-Hellman Examples -- 5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7 Diffie-Hellman Weaknesses -- 5.8 Using the Public Key to Pass a Secret Key -- 5.9 Lab/Tutorial -- 6: Authentication and Digital Certificates -- 6.1 Introduction -- 6.2 Methods of Authentication -- 6.3 Digital Certificates and PKI -- 6.3.1 PKI and Trust -- 6.3.2 Digital Certificate Types -- 6.3.3 Digital Certificate Reader -- 6.4 Key and Certificate Management -- 6.5 Creating a Signed Certificate -- 6.6 Digital Certificate Passing -- 6.7 Email Encryption -- 6.8 Kerberos -- 6.9 Kerberos Key Sharing -- 6.10 Lab/Tutorial -- 7: Tunneling -- 7.1 Introduction -- 7.2 SSL/TLS Connections -- 7.3 SSL/TLS Handshaking -- 7.4 SSL Risks -- 7.5 VPN Tunnels. 7.6 IKE -- 7.6.1 Phase 1 -- 7.6.2 Phase 2 -- 7.7 Tor -- 7.7.1 Tor Encryption -- 7.7.2 Examining Tor Traffic -- 7.8 Lab/Tutorial -- References -- 8: Crypto Cracking -- 8.1 Introduction -- 8.2 Key Escrow -- 8.3 Cracking the Code -- 8.4 RSA Cracking -- 8.4.1 RSA Crack with Different e Value -- 8.4.2 Cracking RSA by Factorizing N -- 8.4.3 When Me is less than N -- 8.4.4 RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5 Chosen Cipher Attack -- 8.4.6 Blinding Attack -- 8.4.7 Bleichenbacher's Attack -- 8.5 AES Cracking -- 8.5.1 AES Copy-and-Paste -- 8.5.2 AES (Brute Force) -- 8.5.3 AES Cracking with Non-Random Numbers -- 8.6 Digital Certificate Cracking -- 8.7 Lab/Tutorial -- References -- 9: Light-Weight Cryptography and Other Methods -- 9.1 Introduction -- 9.2 Light-Weight Symmetric Methods -- 9.3 Light-Weight Hashing -- 9.4 Other Light Weight Ciphers -- 9.5 Secret Shares -- 9.6 Post Quantum Cryptography -- 9.7 Lab/Tutorial -- References -- 10: Blockchain and Crypto-Currency -- 10.1 Introduction -- 10.2 Bitcoins, Blockchain and Miners -- 10.2.1 Bitcoin Transactions -- 10.2.2 Mining Process -- 10.3 Ethereum -- 10.3.1 Gas -- 10.3.2 Practical Implementation of Ethereum -- 10.3.3 Smart Contracts -- 10.4 Lab/Tutorial -- References -- 11: Zero-Knowledge Proof (ZKP) and Privacy Preserving -- 11.1 Introduction -- 11.2 ZKP: Discrete Logs -- 11.3 Commutative Encryption -- 11.4 Graphs and Hamiltonian Cycles -- 11.5 Feige-Fiat-Shamir -- 11.6 Non-Interactive Random Oracle Access for Zero-Knowledge Proof -- 11.7 A Fair Coin Flip -- 11.8 ZKP: Paillier -- 11.9 Oblivious Transfer (OT) -- 11.10 Scrambled Circuits -- 11.11 Millionaire's Problem -- 11.12 RAPPOR -- 11.13 Secure Function Evaluation (SFE) -- 11.14 Secure Remote Password (SRP) Protocol -- 11.15 Lab/Tutorial -- Reference -- 12: Wireless Cryptography and Stream Ciphers -- 12.1 Introduction -- 12.2 RC4. 12.3 WEP -- 12.4 Wi-Fi Standards -- 12.5 WPA and WPA-2 -- 12.6 WPA-2 Handshaking -- 12.7 Cracking WPA-2 PSK -- 12.8 Stream Ciphers -- 12.9 A5 Ciphers -- 12.9.1 Practical Systems -- 12.9.2 A5/3 -- 12.10 Lab/Tutorial -- References -- Appendix A -- Index -- About the Author.

This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.

9781000795349


Cryptography.


Electronic books.

Z104.B834 2017

005.824

© 2024 Resource Centre. All rights reserved.