TY - BOOK AU - Ferguson,Niels AU - Schneier,Bruce AU - Kohno,Tadayoshi TI - Cryptography engineering: design principles and practical applications SN - 9780470474242 (pbk : alk. paper) U1 - 005.82 22 PY - 2010/// CY - Indianapolis, IN PB - Wiley Pub., inc. KW - Cryptography KW - Computer security N1 - CONTENTS PART I: INTRODUCTION CHAPTER 1: THE CONTEXT OF CRYPTOGRAPHY the role of cryptography the weakest link property the adversarial setting professional paranoia threat model e.tc CHAPTER 2: INTRODUCTION TO CRYPTOGRAPHY Encryption authentication public-key encryption digital signatures e.tc PART II: MESSAGE SECURITY CHAPTER 3: BLOCK CIPHER what is block cipher types of attack the ideal block cipher e.tc CHAPTER 4: BLOCK CIPHER MODES padding ECB CBC OFB etc CHAPTER 5: HASH FUNCTIONS Security of harsh functions real hash functions weakness of hash functions e.tc CHAPTER 6: MESSAGE AUTHENTICATION CODES what a MAC does The ideal MAC and MAC security CBC-MAC and CMAC e.tc CHAPTER 7: IMPLEMENTATION ISSUES Creating correct programs Creating secure software Keeping secrets e.tc CHAPTER 8: IMPLEMENTAION ISSUES creating correct programs Creating secure software keeping secrets e.tc PART III: KEY NEGOTIATION CHAPTER 9: GENERATING RANDOMNESS real random Attack models for a PRNG Fortuna The generator e.tc CHAPTER 10: PRIMES divisibility and primes generating small primes computations modulo a prime e.tc CHAPTER 11: DIFFIE-HELLMAN Groups Basic DH Man in the middle e.tc CHAPTER 12: RSA Introduction The Chinese Remainder Theorem Multiplication Modulo n e.tc CHAPTER 13: INTRODUCTION TO CRYPTOGRAPHIC PROTOCOLS roles trust incentive e.tc CHAPTER 14: KEY NEGOTIATION The setting A first try Protocols live forever e.tc CHAPTER 15: IMPLEMENTATION ISSUES Large inter arithmetic Faster multiplication Side - channel attacks e.tc PART IV: KEY MANAGEMENT CHAPTER 16: THE CLOCK Uses for a clock Using the real- time clock chip e.tc CHAPTER 17: KEY SERVES Basics Kerberos Simpler solutions e.tc CHAPTER 18: THE DREAM OF KPI A very short PKI overview PKI examples Additional details e.tc CHAPTER 19: PKI Reality Names Authority Trust Indirect authorization e.tc CHAPTER 20: PKI Practicalities Certificate format the life of a key why keys wear out e.tc CHAPTER 21: STORING SECRETS Disk Human Memory portable storage secure token e.tc CHAPTER 22: STANDARDS AND PATENTS standards patents CHAPTER 23: INVOLVING EXPERTS ; Includes bibliographical references and index ER -