Copyright: 2004
Pages: 402
ISBN: 9781580535304

Our Price: £84.00
Qty:
Our Price: £62.00

Description
With the scope and frequency of attacks on valuable corporate data growing enormously in recent years, a solid understanding of cryptography is essential for anyone working in the computer/network security field. This timely book delivers the hands-on knowledge you need, offering comprehensive coverage on the latest and most-important standardized cryptographic techniques to help you protect your data and computing resources to the fullest. Rather than focusing on theory like other books on the market, this unique resource describes cryptography from an end-user perspective, presenting in-depth, highly practical comparisons of standards and techniques. You learn, in detail, what cryptography can achieve and discover how to choose cryptographic standards that ensure state-of-the-art protection and maximum interoperability. Moreover, the book explains how to select standardized techniques that are most suitable for your specific needs. From encryption, cryptographic hash-functions, and message authentication codes, to digital signatures, authentication protocols, and public key infrastructures, this authoritative reference gives you complete working knowledge of the critical cryptographic tools being utilized world-wide. The book concludes with a look at the future of cryptography, including discussions on crypto-modules and biometrics.
Table Of Contents
Introduction - Scope and Purpose. Structure of Book. Terminology. Modular Arithmetic.; Standards and the Standardization Process - Why Bother with Standards? International, National and Industrial Standards Bodies. Cryptographic Evaluation Bodies. Online Information Regarding Standards.; Security Mechanisms and Security Services - Introduction. The OSI Security Architecture. Security Services. Security Mechanisms.; Encryption - Definitions and Basic Properties. Block Ciphers. Stream Ciphers. Asymmetric Ciphers. ; Modes of Operation for Block Ciphers - Definitions and Basic Properties. Standards for Modes of Operation. Padding Methods. Electronic Codebook (ECB) Mode. Cipher Block Chaining (CBC) Mode. Counter (CTR) Mode. Output Feedback (OFB) Mode. Cipher Feedback (CFB) Mode. Choosing a Mode of Operation. Other Modes.; Cryptographic Hash-Functions - Definitions and Basic Properties. Standards for Hash Functions. Hash Functions Based on Block Ciphers. Dedicated Hash Functions. Hash Functions Based on Modular Arithmetic. Choosing a Hash Function.; Message Authentication Codes (MACs) - Definitions and Basic Properties. Standards for MACs. CBC-MACs. MACs Based on Hash-Functions. Other MAC Functions.; Digital Signatures - Definitions and Basic Properties. Standards for Digital Signatures. The Digital Signature Algorithm (DSA). RSA-Based Signature Schemes. Digital Signature and the Law. Choosing a Digital Signature Scheme. ; Non-Repudiation Mechanisms -Introduction. Standards for Non-Repudiation. Non-Repudiation Model and Services. Non-Repudiation using Symmetric Cryptography. Non-Repudiation using Asymmetric Cryptography. Time-Stamping and Non-Repudiation.; Authentication Protocols - Definitions and Notation. Standards for Entity Authentication Protocols. Cryptographic Mechanisms. Timeliness Checking Mechanisms. Authentication Using Symmetric Cryptography. Authentication Using Asymmetric Cryptography. Manual Authentication Protocols. Proofs of Security. Choosing an Authentication Protocol.; Key Management Framework - Standards for Key Management. Definitions and Basic Properties. The General Framework. The ANSI X9.24 Framework. ; Key Establishment Mechanisms - Definitions and Basic Properties. Standards for Key Establishment. Physical Mechanisms. Mechanisms Using Symmetric Cryptography. Mechanisms Using Asymmetric Cryptography. Key Establishment Based on Weak Secrets. Key Establishment for Mobile Networks. Choosing a Key Establishment Scheme.; Public Key Infrastructures - What is a PKI? Certificate Formats. Certificate Management. Certificate Storage and Retrieval. Certificate Revocation. Certificate Policies and Certification Practice Statements.; Trusted Third Party Mechanisms - Standards for Managing TTPs. Requirements of a TTP. TTP Architectures. Time-Stamping Authorities. Digital Archiving Authorities.; Cryptographic APIs -Introduction. Standards for Crypto APIs. GSS-API.;

Author

  • Alexander W. Dent Alex W. Dent is an EPSRC junior research fellow at the Information Security Group, Royal Holloway, University of London. He holds a Ph.D. in mathematics from the University of London.
  • Chris J. Mitchell Chris J. Mitchell is a professor of computer science at the Information Security Group, Royal Holloway, University of London. He holds a Ph.D. in mathematics from the University of London.