| |
| |
List of Figures | |
| |
| |
List of Tables | |
| |
| |
| |
Setting the Scene | |
| |
| |
| |
Basic Principles | |
| |
| |
| |
Why information security? | |
| |
| |
| |
Security risks | |
| |
| |
| |
Security services | |
| |
| |
| |
Fundamentals of cryptosystems | |
| |
| |
| |
Cryptosystem security assumptions | |
| |
| |
| |
Breaking cryptosystems | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Historical Cryptosystems | |
| |
| |
| |
Monoalphabetic ciphers | |
| |
| |
| |
Historical advances | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Theoretical versus Practical Security | |
| |
| |
| |
Theoretical security | |
| |
| |
| |
Practical security | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
The Cryptographic Toolkit | |
| |
| |
| |
Symmetric Encryption | |
| |
| |
| |
Classification of symmetric encryption algorithms | |
| |
| |
| |
Stream ciphers | |
| |
| |
| |
Block ciphers | |
| |
| |
| |
The Data Encryption Standard | |
| |
| |
| |
The Advanced Encryption Standard | |
| |
| |
| |
Modes of operation | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Public-Key Encryption | |
| |
| |
| |
Public-key cryptography | |
| |
| |
| |
RSA | |
| |
| |
| |
ElGamal and elliptic curve variants | |
| |
| |
| |
Comparison of RSA, ElGamal and elliptic curve variants | |
| |
| |
| |
Uses in practice of public-key cryptosystems | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Data Integrity | |
| |
| |
| |
Different levels of data integrity | |
| |
| |
| |
Hash functions | |
| |
| |
| |
Message authentication codes | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Digital Signature Schemes | |
| |
| |
| |
Digital signatures | |
| |
| |
| |
Non-repudiation using symmetric techniques | |
| |
| |
| |
Digital signature schemes based on RSA | |
| |
| |
| |
Digital signature schemes in practice | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Entity Authentication | |
| |
| |
| |
Random number generation | |
| |
| |
| |
Providing freshness | |
| |
| |
| |
Fundamentals of entity authentication | |
| |
| |
| |
Passwords | |
| |
| |
| |
Dynamic password schemes | |
| |
| |
| |
Zero-knowledge mechanisms | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Cryptographic Protocols | |
| |
| |
| |
Protocol basics | |
| |
| |
| |
From objectives to a protocol | |
| |
| |
| |
Analysing a simple protocol | |
| |
| |
| |
Authentication and key establishment protocols | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Key Management | |
| |
| |
| |
Key Management | |
| |
| |
| |
Key management fundamentals | |
| |
| |
| |
Key lengths and lifetimes | |
| |
| |
| |
Key generation | |
| |
| |
| |
Key establishment | |
| |
| |
| |
Key storage | |
| |
| |
| |
Key usage | |
| |
| |
| |
Governing key management | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Public-Key Management | |
| |
| |
| |
Certification of public keys | |
| |
| |
| |
The certificate lifecycle | |
| |
| |
| |
Public-key management models | |
| |
| |
| |
Alternative approaches | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Applications | |
| |
| |
| |
Cryptographic Applications | |
| |
| |
| |
Cryptography on the Internet | |
| |
| |
| |
Cryptography for wireless local area networks | |
| |
| |
| |
Cryptography for mobile telecommunications | |
| |
| |
| |
Cryptography for secure payment card transactions | |
| |
| |
| |
Cryptography for video broadcasting | |
| |
| |
| |
Cryptography for identity cards | |
| |
| |
| |
Cryptography for home users | |
| |
| |
| |
Summary | |
| |
| |
| |
Further reading | |
| |
| |
| |
Activities | |
| |
| |
| |
Closing Remarks | |
| |
| |
Mathematics Appendix | |
| |
| |
| |
Decimal, binary and hex | |
| |
| |
| |
Modular arithmetic | |
| |
| |
| |
The mathematics of RSA | |
| |
| |
| |
The mathematics of ElGamal | |
| |
| |
| |
Further reading | |
| |
| |
Bibliography | |
| |
| |
Index | |