Limit search to available items
Book Cover
E-book
Author Schaefer, Guenter

Title Security in Fixed and Wireless Networks
Published Newark : John Wiley & Sons, Incorporated, 2016

Copies

Description 1 online resource (621 p.)
Series New York Academy of Sciences Ser
New York Academy of Sciences Ser
Contents Cover -- Title Page -- Copyright -- Contents -- About the authors -- Preface to the second edition -- Preface to the first edition -- Part I Foundations of Data Security Technology -- Chapter 1 Introduction -- 1.1 Content and Structure of this Book -- 1.2 Threats and Security Goals -- 1.3 Network Security Analysis -- 1.4 Information Security Measures -- 1.5 Important Terms Relating to Communication Security -- Chapter 2 Fundamentals of Cryptology -- 2.1 Cryptology, Cryptography and Cryptanalysis -- 2.2 Classification of Cryptographic Algorithms -- 2.3 Cryptanalysis
2.4 Estimating the Effort Needed for Cryptographic Analysis -- 2.5 Characteristics and Classification of Encryption Algorithms -- 2.6 Key Management -- 2.7 Summary -- 2.8 Supplemental Reading -- 2.9 Questions -- Chapter 3 Symmetric Cryptography -- 3.1 Encryption Modes of Block Ciphers -- 3.2 Data Encryption Standard -- 3.3 Advanced Encryption Standard -- 3.4 RC4 Algorithm -- 3.5 The KASUMI algorithm -- 3.6 Summary -- 3.7 Supplemental Reading -- 3.8 Questions -- Chapter 4 Asymmetric Cryptography -- 4.1 Basic Idea of Asymmetric Cryptography -- 4.2 Mathematical Principles -- 4.3 The RSA Algorithm
4.4 The Problem of the Discrete Logarithm -- 4.5 The Diffie-Hellman Key Exchange Algorithm -- 4.6 The ElGamal Algorithm -- 4.7 Security of Conventional Asymmetric Cryptographic Schemes -- 4.8 Principles of Cryptography Based on Elliptic Curves -- 4.8.1 Elliptic Curves over R -- 4.8.2 Elliptic Curves over Zp -- 4.8.3 Elliptic Curves over GF(2n) -- 4.8.4 Cryptographic Protocols Based on Elliptic Curves -- 4.8.5 Security of cryptographic techniques over elliptic curves -- 4.8.6 Current Developments in EC Cryptography -- 4.9 Summary -- 4.10 Supplemental Reading -- 4.11 Questions
Chapter 5 Cryptographic Check Values -- 5.1 Requirements and Classification -- 5.2 Modification Detection Codes -- 5.2.1 Attacks on Modification Detection Codes -- 5.2.2 General Structure of Cryptographic Hash Functions -- 5.2.3 MD5 -- 5.2.4 SHA-1 -- 5.2.5 The SHA-2 Family -- 5.2.6 SHA-3 -- 5.3 Message Authentication Codes -- 5.3.1 Schemes for the Computation of Message Authentication Codes -- 5.3.2 Security of CBC-based Algorithms -- 5.3.3 The CMAC Method -- 5.4 Message Authentication Codes Based on MDCs -- 5.5 Authenticated Encryption -- 5.5.1 The Galois/Counter Mode (GCM)
5.5.2 The SpongeWrap Method -- 5.6 Summary -- 5.7 Supplemental Reading -- 5.8 Questions -- Chapter 6 Random Number Generation -- 6.1 Random Numbers and Pseudo-Random Numbers -- 6.2 Cryptographically Secure Random Numbers -- 6.3 Statistical Tests for Random Numbers -- 6.4 Generation of Random Numbers -- 6.5 Generating Secure Pseudo-Random Numbers -- 6.6 Implementation Security -- 6.7 Summary -- 6.8 Supplemental Reading -- 6.9 Questions -- Chapter 7 Cryptographic Protocols -- 7.1 Properties and Notation of Cryptographic Protocols -- 7.2 Data Origin and Entity Authentication
Notes Description based upon print version of record
7.3 Needham-Schroeder Protocol
Genre/Form Electronic books
Form Electronic book
ISBN 9781119040767
1119040760