Amazon cover image
Image from Amazon.com

Cryptography engineering : design principles and practical applications / Niels Ferguson, Bruce Schneier, Tadayoshi Kohno

By: Contributor(s): Publication details: Indianapolis, IN : Wiley Pub., inc., c2010.Description: xxix, 353 p. : ill. ; 24 cmISBN:
  • 9780470474242 (pbk : alk. paper)
Subject(s): DDC classification:
  • 22 005.82 FER
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Copy number Status Date due Barcode
Book Closed Access Book Closed Access Engineering Library 005.82 FER 1 (Browse shelf(Opens below)) 1 Available BUML24030763

CONTENTS

PART I: INTRODUCTION
CHAPTER 1: THE CONTEXT OF CRYPTOGRAPHY
the role of cryptography
the weakest link property
the adversarial setting
professional paranoia
threat model
e.tc

CHAPTER 2: INTRODUCTION TO CRYPTOGRAPHY
Encryption
authentication
public-key encryption
digital signatures
e.tc

PART II: MESSAGE SECURITY

CHAPTER 3: BLOCK CIPHER
what is block cipher
types of attack
the ideal block cipher
e.tc

CHAPTER 4: BLOCK CIPHER MODES
padding
ECB
CBC
OFB
etc

CHAPTER 5: HASH FUNCTIONS
Security of harsh functions
real hash functions
weakness of hash functions
e.tc


CHAPTER 6: MESSAGE AUTHENTICATION CODES
what a MAC does
The ideal MAC and MAC security
CBC-MAC and CMAC
e.tc

CHAPTER 7: IMPLEMENTATION ISSUES
Creating correct programs
Creating secure software
Keeping secrets
e.tc

CHAPTER 8: IMPLEMENTAION ISSUES
creating correct programs
Creating secure software
keeping secrets
e.tc


PART III: KEY NEGOTIATION

CHAPTER 9: GENERATING RANDOMNESS
real random
Attack models for a PRNG
Fortuna
The generator
e.tc

CHAPTER 10: PRIMES
divisibility and primes
generating small primes
computations modulo a prime
e.tc

CHAPTER 11: DIFFIE-HELLMAN
Groups
Basic DH
Man in the middle
e.tc

CHAPTER 12: RSA
Introduction
The Chinese Remainder Theorem
Multiplication Modulo n
e.tc

CHAPTER 13: INTRODUCTION TO CRYPTOGRAPHIC PROTOCOLS
roles
trust
incentive
e.tc


CHAPTER 14: KEY NEGOTIATION
The setting
A first try
Protocols live forever
e.tc

CHAPTER 15: IMPLEMENTATION ISSUES
Large inter arithmetic
Faster multiplication
Side - channel attacks
e.tc

PART IV: KEY MANAGEMENT

CHAPTER 16: THE CLOCK
Uses for a clock
Using the real- time clock chip
e.tc

CHAPTER 17: KEY SERVES
Basics
Kerberos
Simpler solutions
e.tc

CHAPTER 18: THE DREAM OF KPI
A very short PKI overview
PKI examples
Additional details
e.tc

CHAPTER 19: PKI Reality
Names
Authority
Trust
Indirect authorization
e.tc

CHAPTER 20: PKI Practicalities
Certificate format
the life of a key
why keys wear out
e.tc

CHAPTER 21: STORING SECRETS
Disk
Human Memory
portable storage
secure token
e.tc

CHAPTER 22: STANDARDS AND PATENTS
standards
patents

CHAPTER 23: INVOLVING EXPERTS

Includes bibliographical references and index.

There are no comments on this title.

to post a comment.