ORPP logo
Image from Google Jackets

Cryptography.

By: Material type: TextTextPublisher: Milton : River Publishers, 2017Copyright date: ©2017Edition: 1st edDescription: 1 online resource (425 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781000795349
Subject(s): Genre/Form: Additional physical formats: Print version:: CryptographyDDC classification:
  • 005.824
LOC classification:
  • Z104.B834 2017
Online resources:
Contents:
Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- List of Figures -- List of Tables -- Introduction -- 1: Ciphers and Fundamentals -- 1.1 Introduction -- 1.2 Simple Cipher Methods -- 1.2.1 Morse Code -- 1.2.2 Pigpen -- 1.2.3 Rail Code -- 1.2.4 BIFID Cipher -- 1.2.5 Playfair -- 1.2.6 Homophonic Substitution Code -- 1.2.7 Caesar Coding and Scrambled Alphabet -- 1.2.8 Vigenère Cipher -- 1.2.9 One-Time Pad (OTP) -- 1.3 Encoding Methods -- 1.3.1 Hexadecimal and Base-64 -- 1.4 Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5 Data Integrity (CRC-32) -- 1.6 Little Endian or Big Endian -- 1.7 Introduction to Probability and Number Theory -- 1.7.1 Combinations and Permutations -- 1.7.2 Probability Theory -- 1.7.3 Set Theory -- 1.7.4 Number Representations -- 1.7.5 Logarithms -- 1.8 Prime Numbers -- 1.9 Encryption Operators (Mod, EX-OR and Shift) -- 1.9.1 Mod Operator -- 1.9.2 Shift-Operators -- 1.9.3 Integers and Big Integers -- 1.9.4 X-OR -- 1.9.5 Modulo-2 Operations -- 1.10 GCD -- 1.11 Random Number Generators -- 1.11.1 Linear Congruential Random Numbers -- 1.12 Frequency Analysis -- 1.13 Lab/Tutorial -- 2: Secret Key Encryption -- 2.1 Introduction -- 2.1.1 Early Days -- 2.1.2 Encryption -- 2.1.3 Secure Communications -- 2.1.4 Modern Methods -- 2.2 Key-Based Cryptography -- 2.2.1 Computation Difficulty -- 2.2.2 Stream Encryption and Block Encryption -- 2.2.3 Padding -- 2.3 Brute-Force Analysis -- 2.4 Adding Salt -- 2.4.1 Cipher Block Chaining CBC -- 2.4.2 Cipher Feedback (CFB) -- 2.4.3 Output Feedback (OFB) -- 2.4.4 Counter Mode -- 2.4.5 CBC Example -- 2.5 AES -- 2.5.1 Substitution Bytes (S-Box) -- 2.5.2 Shift Row Transformation -- 2.5.3 Mix Column Transformation -- 2.5.4 Add Round Key Transformation -- 2.6 Secret-Key Encryption -- 2.6.1 DES/3-DES -- 2.6.2 RC4 -- 2.6.3 AES/Rijndael -- 2.6.4 IDEA.
2.6.5 RC5 -- 2.6.6 Skipjack -- 2.6.7 Blowfish -- 2.6.8 Twofish -- 2.6.9 Camellia -- 2.6.10 XTEA -- 2.7 Key Entropy -- 2.8 OpenSSL -- 2.9 Pohlog-Hellman -- 2.10 Lab/Tutorial -- 3: Hashing -- 3.1 Introduction -- 3.2 Hashing Methods -- 3.3 Problems with Hashes -- 3.3.1 Hash Cracking -- 3.4 Salting the Hash Value -- 3.5 Common Hashing Methods -- 3.5.1 LM Hashing -- 3.5.2 APR1 (MD5 with Salt) -- 3.5.3 SHA1, SHA256 and SHA512 -- 3.5.4 PHPass -- 3.5.5 Non-Cryptographic Hashes -- 3.6 Authenticating the Sender -- 3.7 HMAC (Hash Message Authentication Code) -- 3.8 Password Hashing -- 3.9 Password Cracking -- 3.10 One Time Passwords -- 3.11 Time Stamp Protocol -- 3.12 Winnowing and Chaffing -- 3.13 SHA-3 -- 3.14 Lab/Tutorial -- References -- 4: Public Key -- 4.1 Introduction -- 4.2 RSA -- 4.3 Elliptic Curve Ciphers (ECC) -- 4.4 ElGamal -- 4.5 Cramer-Shoup -- 4.6 Paillier Cryptosystem -- 4.7 Knapsack Encryption -- 4.8 Identity-Based Encryption -- 4.9 Lab/Tutorial -- Reference -- 5: Key Exchange -- 5.1 Introduction -- 5.2 Diffie-Hellman Key Exchange -- 5.3 Creating the Generator -- 5.4 Diffie-Hellman Examples -- 5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7 Diffie-Hellman Weaknesses -- 5.8 Using the Public Key to Pass a Secret Key -- 5.9 Lab/Tutorial -- 6: Authentication and Digital Certificates -- 6.1 Introduction -- 6.2 Methods of Authentication -- 6.3 Digital Certificates and PKI -- 6.3.1 PKI and Trust -- 6.3.2 Digital Certificate Types -- 6.3.3 Digital Certificate Reader -- 6.4 Key and Certificate Management -- 6.5 Creating a Signed Certificate -- 6.6 Digital Certificate Passing -- 6.7 Email Encryption -- 6.8 Kerberos -- 6.9 Kerberos Key Sharing -- 6.10 Lab/Tutorial -- 7: Tunneling -- 7.1 Introduction -- 7.2 SSL/TLS Connections -- 7.3 SSL/TLS Handshaking -- 7.4 SSL Risks -- 7.5 VPN Tunnels.
7.6 IKE -- 7.6.1 Phase 1 -- 7.6.2 Phase 2 -- 7.7 Tor -- 7.7.1 Tor Encryption -- 7.7.2 Examining Tor Traffic -- 7.8 Lab/Tutorial -- References -- 8: Crypto Cracking -- 8.1 Introduction -- 8.2 Key Escrow -- 8.3 Cracking the Code -- 8.4 RSA Cracking -- 8.4.1 RSA Crack with Different e Value -- 8.4.2 Cracking RSA by Factorizing N -- 8.4.3 When Me is less than N -- 8.4.4 RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5 Chosen Cipher Attack -- 8.4.6 Blinding Attack -- 8.4.7 Bleichenbacher's Attack -- 8.5 AES Cracking -- 8.5.1 AES Copy-and-Paste -- 8.5.2 AES (Brute Force) -- 8.5.3 AES Cracking with Non-Random Numbers -- 8.6 Digital Certificate Cracking -- 8.7 Lab/Tutorial -- References -- 9: Light-Weight Cryptography and Other Methods -- 9.1 Introduction -- 9.2 Light-Weight Symmetric Methods -- 9.3 Light-Weight Hashing -- 9.4 Other Light Weight Ciphers -- 9.5 Secret Shares -- 9.6 Post Quantum Cryptography -- 9.7 Lab/Tutorial -- References -- 10: Blockchain and Crypto-Currency -- 10.1 Introduction -- 10.2 Bitcoins, Blockchain and Miners -- 10.2.1 Bitcoin Transactions -- 10.2.2 Mining Process -- 10.3 Ethereum -- 10.3.1 Gas -- 10.3.2 Practical Implementation of Ethereum -- 10.3.3 Smart Contracts -- 10.4 Lab/Tutorial -- References -- 11: Zero-Knowledge Proof (ZKP) and Privacy Preserving -- 11.1 Introduction -- 11.2 ZKP: Discrete Logs -- 11.3 Commutative Encryption -- 11.4 Graphs and Hamiltonian Cycles -- 11.5 Feige-Fiat-Shamir -- 11.6 Non-Interactive Random Oracle Access for Zero-Knowledge Proof -- 11.7 A Fair Coin Flip -- 11.8 ZKP: Paillier -- 11.9 Oblivious Transfer (OT) -- 11.10 Scrambled Circuits -- 11.11 Millionaire's Problem -- 11.12 RAPPOR -- 11.13 Secure Function Evaluation (SFE) -- 11.14 Secure Remote Password (SRP) Protocol -- 11.15 Lab/Tutorial -- Reference -- 12: Wireless Cryptography and Stream Ciphers -- 12.1 Introduction -- 12.2 RC4.
12.3 WEP -- 12.4 Wi-Fi Standards -- 12.5 WPA and WPA-2 -- 12.6 WPA-2 Handshaking -- 12.7 Cracking WPA-2 PSK -- 12.8 Stream Ciphers -- 12.9 A5 Ciphers -- 12.9.1 Practical Systems -- 12.9.2 A5/3 -- 12.10 Lab/Tutorial -- References -- Appendix A -- Index -- About the Author.
Summary: This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Cover -- Half Title -- Series Page -- Title Page -- Copyright Page -- Table of Contents -- Acknowledgement -- List of Figures -- List of Tables -- Introduction -- 1: Ciphers and Fundamentals -- 1.1 Introduction -- 1.2 Simple Cipher Methods -- 1.2.1 Morse Code -- 1.2.2 Pigpen -- 1.2.3 Rail Code -- 1.2.4 BIFID Cipher -- 1.2.5 Playfair -- 1.2.6 Homophonic Substitution Code -- 1.2.7 Caesar Coding and Scrambled Alphabet -- 1.2.8 Vigenère Cipher -- 1.2.9 One-Time Pad (OTP) -- 1.3 Encoding Methods -- 1.3.1 Hexadecimal and Base-64 -- 1.4 Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5 Data Integrity (CRC-32) -- 1.6 Little Endian or Big Endian -- 1.7 Introduction to Probability and Number Theory -- 1.7.1 Combinations and Permutations -- 1.7.2 Probability Theory -- 1.7.3 Set Theory -- 1.7.4 Number Representations -- 1.7.5 Logarithms -- 1.8 Prime Numbers -- 1.9 Encryption Operators (Mod, EX-OR and Shift) -- 1.9.1 Mod Operator -- 1.9.2 Shift-Operators -- 1.9.3 Integers and Big Integers -- 1.9.4 X-OR -- 1.9.5 Modulo-2 Operations -- 1.10 GCD -- 1.11 Random Number Generators -- 1.11.1 Linear Congruential Random Numbers -- 1.12 Frequency Analysis -- 1.13 Lab/Tutorial -- 2: Secret Key Encryption -- 2.1 Introduction -- 2.1.1 Early Days -- 2.1.2 Encryption -- 2.1.3 Secure Communications -- 2.1.4 Modern Methods -- 2.2 Key-Based Cryptography -- 2.2.1 Computation Difficulty -- 2.2.2 Stream Encryption and Block Encryption -- 2.2.3 Padding -- 2.3 Brute-Force Analysis -- 2.4 Adding Salt -- 2.4.1 Cipher Block Chaining CBC -- 2.4.2 Cipher Feedback (CFB) -- 2.4.3 Output Feedback (OFB) -- 2.4.4 Counter Mode -- 2.4.5 CBC Example -- 2.5 AES -- 2.5.1 Substitution Bytes (S-Box) -- 2.5.2 Shift Row Transformation -- 2.5.3 Mix Column Transformation -- 2.5.4 Add Round Key Transformation -- 2.6 Secret-Key Encryption -- 2.6.1 DES/3-DES -- 2.6.2 RC4 -- 2.6.3 AES/Rijndael -- 2.6.4 IDEA.

2.6.5 RC5 -- 2.6.6 Skipjack -- 2.6.7 Blowfish -- 2.6.8 Twofish -- 2.6.9 Camellia -- 2.6.10 XTEA -- 2.7 Key Entropy -- 2.8 OpenSSL -- 2.9 Pohlog-Hellman -- 2.10 Lab/Tutorial -- 3: Hashing -- 3.1 Introduction -- 3.2 Hashing Methods -- 3.3 Problems with Hashes -- 3.3.1 Hash Cracking -- 3.4 Salting the Hash Value -- 3.5 Common Hashing Methods -- 3.5.1 LM Hashing -- 3.5.2 APR1 (MD5 with Salt) -- 3.5.3 SHA1, SHA256 and SHA512 -- 3.5.4 PHPass -- 3.5.5 Non-Cryptographic Hashes -- 3.6 Authenticating the Sender -- 3.7 HMAC (Hash Message Authentication Code) -- 3.8 Password Hashing -- 3.9 Password Cracking -- 3.10 One Time Passwords -- 3.11 Time Stamp Protocol -- 3.12 Winnowing and Chaffing -- 3.13 SHA-3 -- 3.14 Lab/Tutorial -- References -- 4: Public Key -- 4.1 Introduction -- 4.2 RSA -- 4.3 Elliptic Curve Ciphers (ECC) -- 4.4 ElGamal -- 4.5 Cramer-Shoup -- 4.6 Paillier Cryptosystem -- 4.7 Knapsack Encryption -- 4.8 Identity-Based Encryption -- 4.9 Lab/Tutorial -- Reference -- 5: Key Exchange -- 5.1 Introduction -- 5.2 Diffie-Hellman Key Exchange -- 5.3 Creating the Generator -- 5.4 Diffie-Hellman Examples -- 5.5 Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6 (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7 Diffie-Hellman Weaknesses -- 5.8 Using the Public Key to Pass a Secret Key -- 5.9 Lab/Tutorial -- 6: Authentication and Digital Certificates -- 6.1 Introduction -- 6.2 Methods of Authentication -- 6.3 Digital Certificates and PKI -- 6.3.1 PKI and Trust -- 6.3.2 Digital Certificate Types -- 6.3.3 Digital Certificate Reader -- 6.4 Key and Certificate Management -- 6.5 Creating a Signed Certificate -- 6.6 Digital Certificate Passing -- 6.7 Email Encryption -- 6.8 Kerberos -- 6.9 Kerberos Key Sharing -- 6.10 Lab/Tutorial -- 7: Tunneling -- 7.1 Introduction -- 7.2 SSL/TLS Connections -- 7.3 SSL/TLS Handshaking -- 7.4 SSL Risks -- 7.5 VPN Tunnels.

7.6 IKE -- 7.6.1 Phase 1 -- 7.6.2 Phase 2 -- 7.7 Tor -- 7.7.1 Tor Encryption -- 7.7.2 Examining Tor Traffic -- 7.8 Lab/Tutorial -- References -- 8: Crypto Cracking -- 8.1 Introduction -- 8.2 Key Escrow -- 8.3 Cracking the Code -- 8.4 RSA Cracking -- 8.4.1 RSA Crack with Different e Value -- 8.4.2 Cracking RSA by Factorizing N -- 8.4.3 When Me is less than N -- 8.4.4 RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5 Chosen Cipher Attack -- 8.4.6 Blinding Attack -- 8.4.7 Bleichenbacher's Attack -- 8.5 AES Cracking -- 8.5.1 AES Copy-and-Paste -- 8.5.2 AES (Brute Force) -- 8.5.3 AES Cracking with Non-Random Numbers -- 8.6 Digital Certificate Cracking -- 8.7 Lab/Tutorial -- References -- 9: Light-Weight Cryptography and Other Methods -- 9.1 Introduction -- 9.2 Light-Weight Symmetric Methods -- 9.3 Light-Weight Hashing -- 9.4 Other Light Weight Ciphers -- 9.5 Secret Shares -- 9.6 Post Quantum Cryptography -- 9.7 Lab/Tutorial -- References -- 10: Blockchain and Crypto-Currency -- 10.1 Introduction -- 10.2 Bitcoins, Blockchain and Miners -- 10.2.1 Bitcoin Transactions -- 10.2.2 Mining Process -- 10.3 Ethereum -- 10.3.1 Gas -- 10.3.2 Practical Implementation of Ethereum -- 10.3.3 Smart Contracts -- 10.4 Lab/Tutorial -- References -- 11: Zero-Knowledge Proof (ZKP) and Privacy Preserving -- 11.1 Introduction -- 11.2 ZKP: Discrete Logs -- 11.3 Commutative Encryption -- 11.4 Graphs and Hamiltonian Cycles -- 11.5 Feige-Fiat-Shamir -- 11.6 Non-Interactive Random Oracle Access for Zero-Knowledge Proof -- 11.7 A Fair Coin Flip -- 11.8 ZKP: Paillier -- 11.9 Oblivious Transfer (OT) -- 11.10 Scrambled Circuits -- 11.11 Millionaire's Problem -- 11.12 RAPPOR -- 11.13 Secure Function Evaluation (SFE) -- 11.14 Secure Remote Password (SRP) Protocol -- 11.15 Lab/Tutorial -- Reference -- 12: Wireless Cryptography and Stream Ciphers -- 12.1 Introduction -- 12.2 RC4.

12.3 WEP -- 12.4 Wi-Fi Standards -- 12.5 WPA and WPA-2 -- 12.6 WPA-2 Handshaking -- 12.7 Cracking WPA-2 PSK -- 12.8 Stream Ciphers -- 12.9 A5 Ciphers -- 12.9.1 Practical Systems -- 12.9.2 A5/3 -- 12.10 Lab/Tutorial -- References -- Appendix A -- Index -- About the Author.

This book aims to develop a deep understanding of cryptography, and provide a way of understanding how privacy, identity provision and integrity can be enhanced with the usage of encryption.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments on this title.

to post a comment.

© 2024 Resource Centre. All rights reserved.