Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
16Activity

Table Of Contents

1.1 Literature Recommendations
1.2 Overview on the Field of Cryptology
1.3 Symmetric Cryptosystems
1.3.1 Basics
1.3.2 A Motivating Example: The Substitution Cipher
1.3.3 How Many Key Bits Are Enough?
1.4 Cryptanalysis
1.4.1 Rules of the Game
1.4.2 Attacks against Crypto Algorithms
1.5 Some Number Theory
1.7 Lessons Learned — Introduction
Stream Ciphers
2.1 Introduction
2.2 Some Remarks on Random Number Generators
2.4 Synchronous Stream Ciphers
2.4.1 Linear Feedback Shift Registers (LFSR)
2.4.2 Clock Controlled Shift Registers
2.5 Known Plaintext Attack Against Single LFSRs
2.6 Lessons Learned — Stream Ciphers
Data Encryption Standard (DES)
3.1 Confusion and Diffusion
3.2 Introduction to DES
3.2.1 Overview
3.2.2 Permutations
3.2.3 Core Iteration / f-Function
3.2.4 Key Schedule
3.3 Decryption
3.4 Implementation
3.4.1 Hardware
3.4.2 Software
3.5 Attacks
3.5.1 Exhaustive Key Search
3.6 DES Alternatives
3.7 Lessons Learned — DES
Rijndael – The Advanced Encryption
4.1 Introduction
4.1.1 Basic Facts about AES
4.1.2 Chronology of the AES Process
4.2 Rijndael Overview
4.4.1 Byte Substitution Layer
4.4.2 Diffusion Layer
4.4.3 Key Addition Layer
4.5 Decryption
4.6 Implementation
4.6.1 Hardware
4.6.2 Software
4.7 Lessons Learned — AES
More about Block Ciphers
5.1 Modes of Operation
5.1.1 Electronic Codebook Mode (ECB)
5.1.2 Cipher Block Chaining Mode (CBC)
5.1.3 Cipher Feedback Mode (CFB)
5.1.4 Counter Mode
5.2 Key Whitening
5.3 Multiple Encryption
5.3.1 Double Encryption
5.3.2 Triple Encryption
5.4 Lessons Learned — More About Block Ciphers
6.1 Principle
6.2 One-Way Functions
6.3 Overview of Public-Key Algorithms
6.4 Important Public-Key Standards
6.5 More Number Theory
6.5.1 Euclid’s Algorithm
6.5.2 Euler’s Phi Function
6.6 Lessons Learned — Basics of Public-Key Cryptog-
7.1 Cryptosystem
7.2 Computational Aspects
7.2.1 Choosing p and q
7.2.2 Choosing a and b
7.2.3 Encryption/Decryption
7.3 Attacks
7.3.1 Brute Force
7.3.2 Finding Φ(n)
7.3.3 Finding a directly
7.3.4 Factorization of n
7.4 Implementation
7.5 Lessons Learned — RSA
8.1 Some Algebra
8.1.1 Groups
8.1.2 Finite Groups
8.1.3 Subgroups
8.2 The Generalized DL Problem
8.3 Attacks for the DL Problem
8.4 Diffie-Hellman Key Exchange
8.4.1 Protocol
8.4.2 Security
8.5 Lessons Learned — Diffie-Hellman Key Exchange
Elliptic Curve Cryptosystem
9.1 Elliptic Curves
9.2 Cryptosystems
9.2.1 Diffie-Hellman Key Exchange
9.2.2 Menezes-Vanstone Encryption
9.3 Implementation
ElGamal Encryption Scheme
10.1 Cryptosystem
10.2 Computational Aspects
10.2.1 Encryption
10.2.2 Decryption
10.3 Security of ElGamal
Digital Signatures
• Digital Signatures
11.1 Principle
11.2 RSA Signature Scheme
11.3 ElGamal Signature Scheme
11.4 Lessons Learned — Digital Signatures
Error Coding (Channel Coding)
12.1 Cryptography and Coding
12.2 Basics of Channel Codes
12.3 Simple Parity Check Codes
12.4 Weighted Parity Check Codes: The ISBN Book
12.5 Cyclic Redundancy Check (CRC)
Hash Functions
13.1 Introduction
13.3 Hash Algorithms
13.4 Lessons Learned — Hash Functions
14.1 Principle
14.2 MACs from Block Ciphers
14.3 MACs from Hash Functions: HMAC
14.4 Lessons Learned — Message AuthenticationCodes
Security Services
15.1 Attacks Against Information Systems
15.2 Introduction
15.3 Privacy
15.4 Integrity and Sender Authentication
15.4.1 Digital Signatures
15.4.2 MACs
15.4.3 Integrity and Encryption
Key Establishment
16.1 Introduction
16.2 Symmetric-Key Approaches
16.2.2 Key Distribution Center (KDC)
16.3 Public-Key Approaches
16.3.1 Man-In-The-Middle Attack
⇒ Man-in-the-middle attack:
16.3.2 Certificates
16.3.3 Diffie-Hellman Exchange with Certificates
16.3.4 Authenticated Key Agreement
17.1 Introduction
17.2 SSL Record Protocol
17.2.1 Overview of the SSL Record Protocol
0 of .
Results for:
No results containing your search query
P. 1
Cryptography and Data Security

Cryptography and Data Security

Ratings: (0)|Views: 577 |Likes:

More info:

Published by: Mohamed Hussien Hamed on Oct 17, 2010
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/09/2013

pdf

text

original

You're Reading a Free Preview
Pages 5 to 22 are not shown in this preview.
You're Reading a Free Preview
Pages 30 to 66 are not shown in this preview.
You're Reading a Free Preview
Pages 71 to 168 are not shown in this preview.
You're Reading a Free Preview
Pages 173 to 206 are not shown in this preview.

Activity (16)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Wejdan Al-gh liked this
Júlio Santos liked this
damjan_marinič liked this
Jonathan Strahl liked this
Nayan M. Rathod liked this
damjan_marinič liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->