Ferguson, Niels

Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno - Indianapolis, IN : Wiley Pub., inc., c2010. - xxix, 353 p. : ill. ; 24 cm.

CONTENTS

PART I: INTRODUCTION
CHAPTER 1: THE CONTEXT OF CRYPTOGRAPHY
the role of cryptography
the weakest link property
the adversarial setting
professional paranoia
threat model
e.tc

CHAPTER 2: INTRODUCTION TO CRYPTOGRAPHY
Encryption
authentication
public-key encryption
digital signatures
e.tc

PART II: MESSAGE SECURITY

CHAPTER 3: BLOCK CIPHER
what is block cipher
types of attack
the ideal block cipher
e.tc

CHAPTER 4: BLOCK CIPHER MODES
padding
ECB
CBC
OFB
etc

CHAPTER 5: HASH FUNCTIONS
Security of harsh functions
real hash functions
weakness of hash functions
e.tc


CHAPTER 6: MESSAGE AUTHENTICATION CODES
what a MAC does
The ideal MAC and MAC security
CBC-MAC and CMAC
e.tc

CHAPTER 7: IMPLEMENTATION ISSUES
Creating correct programs
Creating secure software
Keeping secrets
e.tc

CHAPTER 8: IMPLEMENTAION ISSUES
creating correct programs
Creating secure software
keeping secrets
e.tc


PART III: KEY NEGOTIATION

CHAPTER 9: GENERATING RANDOMNESS
real random
Attack models for a PRNG
Fortuna
The generator
e.tc

CHAPTER 10: PRIMES
divisibility and primes
generating small primes
computations modulo a prime
e.tc

CHAPTER 11: DIFFIE-HELLMAN
Groups
Basic DH
Man in the middle
e.tc

CHAPTER 12: RSA
Introduction
The Chinese Remainder Theorem
Multiplication Modulo n
e.tc

CHAPTER 13: INTRODUCTION TO CRYPTOGRAPHIC PROTOCOLS
roles
trust
incentive
e.tc


CHAPTER 14: KEY NEGOTIATION
The setting
A first try
Protocols live forever
e.tc

CHAPTER 15: IMPLEMENTATION ISSUES
Large inter arithmetic
Faster multiplication
Side - channel attacks
e.tc

PART IV: KEY MANAGEMENT

CHAPTER 16: THE CLOCK
Uses for a clock
Using the real- time clock chip
e.tc

CHAPTER 17: KEY SERVES
Basics
Kerberos
Simpler solutions
e.tc

CHAPTER 18: THE DREAM OF KPI
A very short PKI overview
PKI examples
Additional details
e.tc

CHAPTER 19: PKI Reality
Names
Authority
Trust
Indirect authorization
e.tc

CHAPTER 20: PKI Practicalities
Certificate format
the life of a key
why keys wear out
e.tc

CHAPTER 21: STORING SECRETS
Disk
Human Memory
portable storage
secure token
e.tc

CHAPTER 22: STANDARDS AND PATENTS
standards
patents

CHAPTER 23: INVOLVING EXPERTS


Includes bibliographical references and index.

9780470474242 (pbk : alk. paper)


Cryptography.
Computer security.

005.82 / FER