Cryptography engineering : (Record no. 6417)

MARC details
000 -LEADER
fixed length control field 03224nam a22002657a 4500
003 - CONTROL NUMBER IDENTIFIER
control field OSt
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240319174201.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210923b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780470474242 (pbk : alk. paper)
040 ## - CATALOGING SOURCE
Original cataloging agency BUL
Transcribing agency BUL
Language of cataloging eng
Modifying agency BUL
Description conventions rda
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 22
Classification number 005.82
Item number FER
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ferguson, Niels
245 10 - TITLE STATEMENT
Title Cryptography engineering :
Remainder of title design principles and practical applications /
Statement of responsibility, etc. Niels Ferguson, Bruce Schneier, Tadayoshi Kohno
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Indianapolis, IN :
Name of publisher, distributor, etc. Wiley Pub., inc.,
Date of publication, distribution, etc. c2010.
300 ## - PHYSICAL DESCRIPTION
Extent xxix, 353 p. :
Other physical details ill. ;
Dimensions 24 cm.
500 ## - GENERAL NOTE
General note CONTENTS<br/><br/>PART I: INTRODUCTION<br/>CHAPTER 1: THE CONTEXT OF CRYPTOGRAPHY<br/>the role of cryptography<br/>the weakest link property<br/>the adversarial setting<br/>professional paranoia<br/>threat model<br/>e.tc<br/><br/>CHAPTER 2: INTRODUCTION TO CRYPTOGRAPHY<br/>Encryption<br/>authentication<br/>public-key encryption<br/>digital signatures<br/>e.tc<br/><br/>PART II: MESSAGE SECURITY<br/><br/>CHAPTER 3: BLOCK CIPHER<br/>what is block cipher<br/>types of attack<br/>the ideal block cipher<br/>e.tc<br/><br/>CHAPTER 4: BLOCK CIPHER MODES<br/>padding<br/>ECB<br/>CBC<br/>OFB<br/>etc<br/><br/>CHAPTER 5: HASH FUNCTIONS<br/>Security of harsh functions<br/>real hash functions<br/>weakness of hash functions<br/>e.tc<br/><br/><br/>CHAPTER 6: MESSAGE AUTHENTICATION CODES<br/>what a MAC does<br/>The ideal MAC and MAC security<br/>CBC-MAC and CMAC<br/>e.tc<br/><br/>CHAPTER 7: IMPLEMENTATION ISSUES<br/>Creating correct programs<br/>Creating secure software<br/>Keeping secrets<br/>e.tc<br/><br/>CHAPTER 8: IMPLEMENTAION ISSUES<br/>creating correct programs<br/>Creating secure software<br/>keeping secrets<br/>e.tc<br/><br/><br/>PART III: KEY NEGOTIATION<br/><br/>CHAPTER 9: GENERATING RANDOMNESS<br/>real random<br/>Attack models for a PRNG<br/>Fortuna<br/>The generator<br/>e.tc<br/><br/>CHAPTER 10: PRIMES<br/>divisibility and primes<br/>generating small primes<br/>computations modulo a prime<br/>e.tc<br/><br/>CHAPTER 11: DIFFIE-HELLMAN<br/>Groups<br/>Basic DH<br/>Man in the middle<br/>e.tc<br/><br/>CHAPTER 12: RSA<br/>Introduction<br/>The Chinese Remainder Theorem<br/>Multiplication Modulo n<br/>e.tc<br/><br/>CHAPTER 13: INTRODUCTION TO CRYPTOGRAPHIC PROTOCOLS<br/>roles<br/>trust<br/>incentive<br/>e.tc<br/><br/><br/>CHAPTER 14: KEY NEGOTIATION<br/>The setting<br/>A first try<br/>Protocols live forever<br/>e.tc<br/><br/>CHAPTER 15: IMPLEMENTATION ISSUES<br/>Large inter arithmetic<br/>Faster multiplication<br/>Side - channel attacks<br/>e.tc<br/><br/>PART IV: KEY MANAGEMENT<br/><br/>CHAPTER 16: THE CLOCK<br/>Uses for a clock<br/>Using the real- time clock chip<br/>e.tc<br/><br/>CHAPTER 17: KEY SERVES<br/>Basics<br/>Kerberos<br/>Simpler solutions<br/>e.tc<br/><br/>CHAPTER 18: THE DREAM OF KPI<br/>A very short PKI overview<br/>PKI examples<br/>Additional details<br/>e.tc<br/><br/>CHAPTER 19: PKI Reality<br/>Names<br/>Authority<br/>Trust<br/>Indirect authorization<br/>e.tc<br/><br/>CHAPTER 20: PKI Practicalities<br/>Certificate format<br/>the life of a key<br/>why keys wear out<br/>e.tc<br/><br/>CHAPTER 21: STORING SECRETS<br/>Disk<br/>Human Memory<br/>portable storage<br/>secure token<br/>e.tc<br/><br/>CHAPTER 22: STANDARDS AND PATENTS<br/>standards<br/>patents<br/><br/>CHAPTER 23: INVOLVING EXPERTS<br/>
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cryptography.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Schneier, Bruce,
Dates associated with a name 1963-
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Kohno, Tadayoshi
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN)
a 7
b cbc
c orignew
d 2
e epcn
f 20
g y-gencatlg
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Book Closed Access
Classification part 005.82
Item part 1
Call number prefix FER
Call number suffix 005.82 FER
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Date acquired Source of acquisition Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Engineering Library Engineering Library 09/23/2021 Purchased 0027619   005.82 FER 1 BUML24030763 09/23/2021 1 09/23/2021 Book Closed Access