Cryptography engineering : (Record no. 6417)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 03224nam a22002657a 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OSt |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240319174201.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 210923b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9780470474242 (pbk : alk. paper) |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | BUL |
Transcribing agency | BUL |
Language of cataloging | eng |
Modifying agency | BUL |
Description conventions | rda |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Edition number | 22 |
Classification number | 005.82 |
Item number | FER |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Ferguson, Niels |
245 10 - TITLE STATEMENT | |
Title | Cryptography engineering : |
Remainder of title | design principles and practical applications / |
Statement of responsibility, etc. | Niels Ferguson, Bruce Schneier, Tadayoshi Kohno |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Indianapolis, IN : |
Name of publisher, distributor, etc. | Wiley Pub., inc., |
Date of publication, distribution, etc. | c2010. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | xxix, 353 p. : |
Other physical details | ill. ; |
Dimensions | 24 cm. |
500 ## - GENERAL NOTE | |
General note | CONTENTS<br/><br/>PART I: INTRODUCTION<br/>CHAPTER 1: THE CONTEXT OF CRYPTOGRAPHY<br/>the role of cryptography<br/>the weakest link property<br/>the adversarial setting<br/>professional paranoia<br/>threat model<br/>e.tc<br/><br/>CHAPTER 2: INTRODUCTION TO CRYPTOGRAPHY<br/>Encryption<br/>authentication<br/>public-key encryption<br/>digital signatures<br/>e.tc<br/><br/>PART II: MESSAGE SECURITY<br/><br/>CHAPTER 3: BLOCK CIPHER<br/>what is block cipher<br/>types of attack<br/>the ideal block cipher<br/>e.tc<br/><br/>CHAPTER 4: BLOCK CIPHER MODES<br/>padding<br/>ECB<br/>CBC<br/>OFB<br/>etc<br/><br/>CHAPTER 5: HASH FUNCTIONS<br/>Security of harsh functions<br/>real hash functions<br/>weakness of hash functions<br/>e.tc<br/><br/><br/>CHAPTER 6: MESSAGE AUTHENTICATION CODES<br/>what a MAC does<br/>The ideal MAC and MAC security<br/>CBC-MAC and CMAC<br/>e.tc<br/><br/>CHAPTER 7: IMPLEMENTATION ISSUES<br/>Creating correct programs<br/>Creating secure software<br/>Keeping secrets<br/>e.tc<br/><br/>CHAPTER 8: IMPLEMENTAION ISSUES<br/>creating correct programs<br/>Creating secure software<br/>keeping secrets<br/>e.tc<br/><br/><br/>PART III: KEY NEGOTIATION<br/><br/>CHAPTER 9: GENERATING RANDOMNESS<br/>real random<br/>Attack models for a PRNG<br/>Fortuna<br/>The generator<br/>e.tc<br/><br/>CHAPTER 10: PRIMES<br/>divisibility and primes<br/>generating small primes<br/>computations modulo a prime<br/>e.tc<br/><br/>CHAPTER 11: DIFFIE-HELLMAN<br/>Groups<br/>Basic DH<br/>Man in the middle<br/>e.tc<br/><br/>CHAPTER 12: RSA<br/>Introduction<br/>The Chinese Remainder Theorem<br/>Multiplication Modulo n<br/>e.tc<br/><br/>CHAPTER 13: INTRODUCTION TO CRYPTOGRAPHIC PROTOCOLS<br/>roles<br/>trust<br/>incentive<br/>e.tc<br/><br/><br/>CHAPTER 14: KEY NEGOTIATION<br/>The setting<br/>A first try<br/>Protocols live forever<br/>e.tc<br/><br/>CHAPTER 15: IMPLEMENTATION ISSUES<br/>Large inter arithmetic<br/>Faster multiplication<br/>Side - channel attacks<br/>e.tc<br/><br/>PART IV: KEY MANAGEMENT<br/><br/>CHAPTER 16: THE CLOCK<br/>Uses for a clock<br/>Using the real- time clock chip<br/>e.tc<br/><br/>CHAPTER 17: KEY SERVES<br/>Basics<br/>Kerberos<br/>Simpler solutions<br/>e.tc<br/><br/>CHAPTER 18: THE DREAM OF KPI<br/>A very short PKI overview<br/>PKI examples<br/>Additional details<br/>e.tc<br/><br/>CHAPTER 19: PKI Reality<br/>Names<br/>Authority<br/>Trust<br/>Indirect authorization<br/>e.tc<br/><br/>CHAPTER 20: PKI Practicalities<br/>Certificate format<br/>the life of a key<br/>why keys wear out<br/>e.tc<br/><br/>CHAPTER 21: STORING SECRETS<br/>Disk<br/>Human Memory<br/>portable storage<br/>secure token<br/>e.tc<br/><br/>CHAPTER 22: STANDARDS AND PATENTS<br/>standards<br/>patents<br/><br/>CHAPTER 23: INVOLVING EXPERTS<br/> |
504 ## - BIBLIOGRAPHY, ETC. NOTE | |
Bibliography, etc. note | Includes bibliographical references and index. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Schneier, Bruce, |
Dates associated with a name | 1963- |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Kohno, Tadayoshi |
906 ## - LOCAL DATA ELEMENT F, LDF (RLIN) | |
a | 7 |
b | cbc |
c | orignew |
d | 2 |
e | epcn |
f | 20 |
g | y-gencatlg |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Source of classification or shelving scheme | Dewey Decimal Classification |
Koha item type | Book Closed Access |
Classification part | 005.82 |
Item part | 1 |
Call number prefix | FER |
Call number suffix | 005.82 FER |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Date acquired | Source of acquisition | Inventory number | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Dewey Decimal Classification | Engineering Library | Engineering Library | 09/23/2021 | Purchased | 0027619 | 005.82 FER 1 | BUML24030763 | 09/23/2021 | 1 | 09/23/2021 | Book Closed Access |