Skip to content

Everyday Cryptography Fundamental Principles and Applications

Spend $50 to get a free DVD!

ISBN-10: 0199695598

ISBN-13: 9780199695591

Edition: 2012

Authors: Keith M. Martin

List price: $72.95
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

Description:

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the fundamental principles that ground modern cryptography as they arise in modern applications, it avoids both an over-reliance on transient current technologies and over-whelming theoretical research.Everyday Cryptographyis a self-contained and widely accessible introductory text. Almost no prior knowledge of mathematics is required since the book deliberately avoids the details of the mathematical techniques underpinning cryptographic mechanisms, though a short appendix is included for those looking for a deeper appreciation of some of the concepts involved. By the end of this book, the reader will not only be able to understand the practical issues concerned with the deployment of cryptographic mechanisms, including the management of cryptographic keys, but will also be able to interpret future developments in this fascinating and increasingly important area of technology.
Customers also bought

Book details

List price: $72.95
Copyright year: 2012
Publisher: Oxford University Press
Publication date: 3/27/2012
Binding: Paperback
Pages: 592
Size: 9.10" wide x 6.00" long x 1.20" tall
Weight: 0.968
Language: English

List of Figures
List of Tables
Setting the Scene
Basic Principles
Why information security?
Security risks
Security services
Fundamentals of cryptosystems
Cryptosystem security assumptions
Breaking cryptosystems
Summary
Further reading
Activities
Historical Cryptosystems
Monoalphabetic ciphers
Historical advances
Summary
Further reading
Activities
Theoretical versus Practical Security
Theoretical security
Practical security
Summary
Further reading
Activities
The Cryptographic Toolkit
Symmetric Encryption
Classification of symmetric encryption algorithms
Stream ciphers
Block ciphers
The Data Encryption Standard
The Advanced Encryption Standard
Modes of operation
Summary
Further reading
Activities
Public-Key Encryption
Public-key cryptography
RSA
ElGamal and elliptic curve variants
Comparison of RSA, ElGamal and elliptic curve variants
Uses in practice of public-key cryptosystems
Summary
Further reading
Activities
Data Integrity
Different levels of data integrity
Hash functions
Message authentication codes
Summary
Further reading
Activities
Digital Signature Schemes
Digital signatures
Non-repudiation using symmetric techniques
Digital signature schemes based on RSA
Digital signature schemes in practice
Summary
Further reading
Activities
Entity Authentication
Random number generation
Providing freshness
Fundamentals of entity authentication
Passwords
Dynamic password schemes
Zero-knowledge mechanisms
Summary
Further reading
Activities
Cryptographic Protocols
Protocol basics
From objectives to a protocol
Analysing a simple protocol
Authentication and key establishment protocols
Summary
Further reading
Activities
Key Management
Key Management
Key management fundamentals
Key lengths and lifetimes
Key generation
Key establishment
Key storage
Key usage
Governing key management
Summary
Further reading
Activities
Public-Key Management
Certification of public keys
The certificate lifecycle
Public-key management models
Alternative approaches
Summary
Further reading
Activities
Applications
Cryptographic Applications
Cryptography on the Internet
Cryptography for wireless local area networks
Cryptography for mobile telecommunications
Cryptography for secure payment card transactions
Cryptography for video broadcasting
Cryptography for identity cards
Cryptography for home users
Summary
Further reading
Activities
Closing Remarks
Mathematics Appendix
Decimal, binary and hex
Modular arithmetic
The mathematics of RSA
The mathematics of ElGamal
Further reading
Bibliography
Index