Skip to content
You are not logged in |Login  
     
Limit search to available items
Record:   Prev Next
Resources
More Information
Bestseller
BestsellerE-book
Author Buchanan, William, author.

Title Cryptography / William J. Buchanan, OBE.

Publication Info. Gistrup, Denmark : River Publishers, [2017]

Item Status

Description 1 online resource.
Physical Medium polychrome
Description text file
Series River Publishers series in information science and technology.
River Publishers series in information science and technology.
Contents Machine generated contents note: 1.1. Introduction -- 1.2. Simple Cipher Methods -- 1.2.1. Morse Code -- 1.2.2. Pigpen -- 1.2.3. Rail Code -- 1.2.4. BIFID Cipher -- 1.2.5. Playfair -- 1.2.6. Homophonic Substitution Code -- 1.2.7. Caesar Coding and Scrambled Alphabet -- 1.2.8. Vigenere Cipher -- 1.2.9. One-Time Pad (OTP) -- 1.3. Encoding Methods -- 1.3.1. Hexadecimal and Base-64 -- 1.4. Huffman Coding and Lempel-Viz Welsh (LZW) -- 1.5. Data Integrity (CRC-32) -- 1.6. Little Endian or Big Endian -- 1.7. Introduction to Probability and Number Theory -- 1.7.1. Combinations and Permutations -- 1.7.2. Probability Theory -- 1.7.3. Set Theory -- 1.7.4. Number Representations -- 1.7.5. Logarithms -- 1.8. Prime Numbers -- 1.9. Encryption Operators (mod, EX-OR and shift) -- 1.9.1. Mod Operator -- 1.9.2. Shift-Operators -- 1.9.3. Integers and Big Integers -- 1.9.4. X-OR -- 1.9.5. Modulo-2 Operations -- 1.10. GCD -- 1.11. Random Number Generators -- 1.11.1. Linear Congruential Random Numbers -- 1.12. Frequency Analysis -- 1.13. Lab/tutorial -- 2.1. Introduction -- 2.1.1. Early Days -- 2.1.2. Encryption -- 2.1.3. Secure Communications -- 2.1.4. Modern Methods -- 2.2. Key-based Cryptography -- 2.2.1. Computation Difficulty -- 2.2.2. Stream Encryption and Block Encryption -- 2.2.3. Padding -- 2.3. Brute-Force Analysis -- 2.4. Adding Salt -- 2.4.1. Cipher Block Chaining CBC -- 2.4.2. Cipher Feedback (CFB) -- 2.4.3. Output Feedback (OFB) -- 2.4.4. Counter Mode -- 2.4.5. CBC Example -- 2.5. AES -- 2.5.1. Substitution Bytes (S-box) -- 2.5.2. Shift Row Transformation -- 2.5.3. Mix Column Transformation -- 2.5.4. Add Round Key Transformation -- 2.6. Secret-Key Encryption -- 2.6.1. DES/3-DES -- 2.6.2. RC4 -- 2.6.3. AES/Rijndael -- 2.6.4. IDEA -- 2.6.5. RC5 -- 2.6.6. Skipjack -- 2.6.7. Blowfish -- 2.6.8. Twofish -- 2.6.9. Camellia -- 2.6.10. XTEA -- 2.7. Key Entropy -- 2.8. OpenSSL -- 2.9. Pohlog-Hellman -- 2.10. Lab/tutorial -- 3.1. Introduction -- 3.2. Hashing Methods -- 3.3. Problems with Hashes -- 3.3.1. Hash Cracking -- 3.4. Salting the Hash Value -- 3.5. Common Hashing Methods -- 3.5.1. LM Hashing -- 3.5.2. APR1 (MD5 with Salt) -- 3.5.3. SHA 1, SHA256 and SHA512 -- 3.5.4. PHPass -- 3.5.5. Non-Cryptographic Hashes -- 3.6. Authenticating the Sender -- 3.7. HMAC (Hash Message Authentication Code) -- 3.8. Password Hashing -- 3.9. Password Cracking -- 3.10. One Time Passwords -- 3.11. Time Stamp Protocol -- 3.12. Winnowing and Chaffing -- 3.13. SHA-3 -- 3.14. Lab/Tutorial -- References -- 4.1. Introduction -- 4.2. RSA -- 4.3. Elliptic Curve Ciphers (ECC) -- 4.4. ElGamal -- 4.5. Cramer-Shoup -- 4.6. Paillier Cryptosystem -- 4.7. Knapsack Encryption -- 4.8. Identity-Based Encryption -- 4.9. Lab/Tutorial -- Reference -- 5.1. Introduction -- 5.2. Diffie-Hellman Key Exchange -- 5.3. Creating the Generator -- 5.4. Diffie-Hellman Examples -- 5.5. Ephemeral Diffie-Hellman with RSA (DHE-RSA) -- 5.6. (Ephemeral) Elliptic Curve Diffie-Hellman (ECDHE) -- 5.7. Diffie-Hellman Weaknesses -- 5.8. Using the Public Key to Pass a Secret Key -- 5.9. Lab/Tutorial -- 6.1. Introduction -- 6.2. Methods of Authentication -- 6.3. Digital Certificates and PKI -- 6.3.1. PM and Trust -- 6.3.2. Digital Certificate Types -- 6.3.3. Digital Certificate Reader -- 6.4. Key and Certificate Management -- 6.5. Creating a Signed Certificate -- 6.6. Digital Certificate Passing -- 6.7. Email Encryption -- 6.8. Kerberos -- 6.9. Kerberos Key Sharing -- 6.10. Lab/Tutorial -- 7.1. Introduction -- 7.2. SSL/TLS Connections -- 7.3. SSUFLS Handshaking -- 7.4. SSL Risks -- 7.5. VPN Tunnels -- 7.6. IKE -- 7.6.1. Phase 1 -- 7.6.2. Phase 2 -- 7.7. Tor -- 7.7.1. Tor Encryption -- 7.7.2. Examining Tor Traffic -- 7.8. Lab/Tutorial -- References -- 8.1. Introduction -- 8.2. Key Escrow -- 8.3. Cracking the Code -- 8.4. RSA Cracking -- 8.4.1. RSA Crack with Different e Value -- 8.4.2. Cracking RSA by Factorizing N -- 8.4.3. When Me Is less than N -- 8.4.4. RSA Crack with Chinese Remainder Theory (CRT) -- 8.4.5. Chosen Cipher Attack -- 8.4.6. Blinding Attack -- 8.4.7. Bleichenbacher's Attack -- 8.5. AES Cracking -- 8.5.1. AES Copy-and-Paste -- 8.5.2. AES (Brute Force) -- 8.5.3. AES Cracking with Non-Random Numbers -- 8.6. Digital Certificate Cracking -- 8.7. Lab/Tutorial -- References -- 9.1. Introduction -- 9.2. Light-Weight Symmetric Methods -- 9.3. Light-Weight Hashing -- 9.4. Other Light Weight Ciphers -- 9.5. Secret Shares -- 9.6. Post Quantum Cryptography -- 9.7. Lab/Tutorial -- References -- 10.1. Introduction -- 10.2. Bitcoins, Blockchain and Miners -- 10.2.1. Bitcoin Transactions -- 10.2.2. Mining Process -- 10.3. Ethereum -- 10.3.1. Gas -- 10.3.2. Practical Implementation of Ethereum -- 10.3.3. Smart Contracts -- 10.4. Lab/Tutorial -- References -- 11.1. Introduction -- 11.2. ZKP: Discrete Logs -- 11.3. Commutative Encryption -- 11.4. Graphs and Hamiltonian Cycles -- 11.5. Feige-Fiat-Shamir -- 11.6. Non-interactive Random Oracle Access for Zero-knowledge Proof -- 11.7. Fair Coin Flip -- 11.8. ZKP: Paillier -- 11.9. Oblivious Transfer (OT) -- 11.10. Scrambled Circuits -- 11.11. Millionaire's Problem -- 11.12. RAPPOR -- 11.13. Secure Function Evaluation (SFE) -- 11.14. Secure Remote Password (SRP) Protocol -- 11.15. Lab/Tutorial -- Reference -- 12.1. Introduction -- 12.2. RC4 -- 12.3. WEP -- 12.4. Wi-fi Standards -- 12.5. WPA and WPA-2 -- 12.6. WPA-2 Handshaking -- 12.7. Cracking WPA-2 PSK -- 12.8. Stream Ciphers -- 12.9. A5 Ciphers -- 12.9.1. Practical Systems -- 12.9.2. A5/3 -- 12.10. Lab/tutorial -- References.
Local Note eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America
Subject Data encryption (Computer science)
Data encryption (Computer science)
Genre/Form Electronic books.
Other Form: Print version: Buchanan, William J. Cryptography. Gistrup, Denmark : River Publishers, [2017] 9788793609143
ISBN 9788793609143 (electronic book)
8793609140 (electronic book)
8793379102
9788793379107