Mogollon - Cryptography and Security Services - Mechanisms and Applications (Cybertech, 2007).pdf
(
4898 KB
)
Pobierz
Cryptography and Security Services : Mechanisms and Applications
Cryptography and
Security Services:
Mechanisms and Applications
Manuel Mogollon
Unversty of Dallas, USA
Cybertech Publishing
Hershey • New York
Acquisition Editor: Kristin Klinger
Senior Managing Editor: Jennifer Neidig
Managing Editor: Sara Reed
Development Editor: Kristin M. Roth
Assistant Development Editor: Meg Stocking
Editorial Assistant:
Deborah Yahnke
Copy Editor:
Erin Meyer
Typesetter:
Jeff Ash
Cover Design:
Lisa Tosheff
Printed at:
Yurchak Printing Inc.
Published in the United States of America by
CyberTech Publishing (an imprint of IGI Global)
701 E. Chocolate Avenue
Hershey PA 17033
Tel: 717-533-8845
Fax: 717-533-8661
E-mail: cust@igi-pub.com
Web site: http://www.cybertech-pub.com
and in the United Kingdom by
CyberTech Publishing (an imprint of IGI Global)
3 Henrietta Street
Covent Garden
London WC2E 8LU
Tel: 44 20 7240 0856
Fax: 44 20 7379 0609
Web site: http://www.eurospanonline.com
Copyright © 2007 by IGI Global. All rights reserved. No part of this book may be reproduced in any form or by
any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this book are for identiication purposes only. Inclusion of the names of
the products or companies does not indicate a claim of ownership by IGI Global of the trademark or registered
trademark.
Library of Congress Cataloging-in-Publication Data
Mogollon, Manuel.
Cryptography and security services : mechanisms and applications / Manuel Mogollon.
p. cm.
Summary: "This book addresses cryptography from the perspective of security services and mechanisms
available to implement them: discussing issues such as e-mail security, public-key architecture, virtual private
networks, Web services security, wireless security, and conidentiality and integrity. It provides scholars and
practitioners working knowledge of fundamental encryption algorithms and systems supported in information
technology and secure communication networks"--Provided by publisher.
Includes bibliographical references and index.
ISBN 978-1-59904-837-6 (hardcover) -- ISBN 978-1-59904-839-0 (ebook)
1. Computers--Access control. 2. Data encryption (Computer science) I. Title.
QA76.9.A25M663 2007
005.8--dc22
British Cataloguing in Publication Data
A Cataloguing in Publication record for this book is available from the British Library.
All work contributed to this book is original material. The views expressed in this book are those of the authors,
but not necessarily of the publisher.
Cryptography and Security
Sevices:
Mechanisms and Applications
Table of Contents
Foreword........................................................................................................................ x
Preface........................................................................................................................... xi
Acknowledgment......................................................................................................... xv
Chapter.I..Classic.Cryptography................................................................................. 1
Classic Cryptography ..................................................................................................... 1
Objectives........................................................................................................................ 1
Introduction..................................................................................................................... 1
Classic Cipher Techniques.............................................................................................. 3
Early Cipher Machines ................................................................................................... 6
Cryptanalysis in World War II ...................................................................................... 12
Summary ....................................................................................................................... 12
Learning Objectives Review ......................................................................................... 13
References ..................................................................................................................... 14
Chapter.II..Information.Assurance........................................................................... 15
Information Assistance.................................................................................................. 15
Objectives...................................................................................................................... 15
Introduction................................................................................................................... 15
Computer Network Architecture ................................................................................... 16
v
The OSI Model .............................................................................................................. 17
The TCP/IP Model ........................................................................................................ 20
Security Policies, Services, and Mechanisms ............................................................... 22
Placeholder Names Used in Cryptography .................................................................. 26
The Transformation of the Crypto Industry .................................................................. 27
U.S. Export Regulations for Encryption Equipment ..................................................... 29
Summary ....................................................................................................................... 30
Learning Objectives Review ......................................................................................... 31
References ..................................................................................................................... 32
Chapter.III..Number.Theory.and.Finite.Fields........................................................ 33
Number Theory and Finite Fields................................................................................. 33
Objectives...................................................................................................................... 33
Introduction................................................................................................................... 33
Principle of Counting.................................................................................................... 34
Exponentiation and Prime Numbers ............................................................................. 35
The Euclidean Algorithm .............................................................................................. 35
Congruence Arithmetic ................................................................................................. 36
Summary of Properties.................................................................................................. 41
Calculation of the Reciprocal (Multiplicative Inverse) ................................................ 42
Multiplication and Exponentiation in Modulo p........................................................... 43
RSA Algorithm............................................................................................................... 45
Finite Fields .................................................................................................................. 45
Boolean Binary Expressions ......................................................................................... 48
Summary ....................................................................................................................... 49
Learning Objectives Review ......................................................................................... 49
References ..................................................................................................................... 50
Chapter IV. Conidentiality: Symmetric Encryption............................................... 51
Conidentiality: Symmetric Encryption......................................................................... 51
Objectives...................................................................................................................... 51
Introduction................................................................................................................... 52
Crypto Systems.............................................................................................................. 54
Stream Cypher Symmetric Encryption .......................................................................... 54
Basic Theory of Enciphering ........................................................................................ 58
Perfect Secrecy.............................................................................................................. 62
Shift Registers ............................................................................................................... 64
Block Encryption Algorithms ........................................................................................ 80
Block Cipher Modes of Operation ................................................................................ 90
Summary ....................................................................................................................... 97
Learning Objectives Review ......................................................................................... 97
References ..................................................................................................................... 99
Chapter V. Conidentiality: Asymmetric Encryption............................................. 101
Conidentiality: Asymmetric Encryption..................................................................... 101
Objectives.................................................................................................................... 101
Introduction................................................................................................................. 102
Exponentiation and Public-Key Ciphers .................................................................... 104
Plik z chomika:
Yohoho25
Inne pliki z tego folderu:
Applied Cryptography, Second Edition Protocols, Algorthms, and Source Code in C - Bruce Schneier.chm
(3706 KB)
Burnett - RSA Security's Official Guide to Cryptography - S. Burnett, S. Paine (2001) WW.pdf
(9387 KB)
Cole - Hiding In Plain Sight - Steganography And The Art Of Covert Communication.pdf
(7862 KB)
Contemporary Cryptology - D. Catalino, et al., (Birkhauser, 2005) WW.pdf
(2296 KB)
Cryptography for Developers - Simon Johnson.pdf
(5133 KB)
Inne foldery tego chomika:
Category Theory
Discrete Mathematics
Logic
Math For Engineers
Programming Math
Zgłoś jeśli
naruszono regulamin