Introduction to Chapter 1
1.1 Security objective
1.1.1 Confidentiality
1.1.2 Integrity
p>1.3 Availability
1.2 Attacks
1.2.1 Attacks that threaten confidentiality
1.2.2. > 1.3.1 security service
1.3.2 security mechanism
1.3.3 relationship between service and mechanism
1.4 technology
1.4.1 cryptography
1.4.2 steganography
1.5 the rest of this book
Part I. Authentication and key management
Part IV Network security
1.6 Recommended reading
1.7 Key terms
1.8 Summary
1.9 Problem sets
Part I Symmetric key encryption
Chapter 2 Cryptography Part I: Modular algorithm, Congruence sum matrix
2.1 integer algorithm
2.1.1 integer set
2.1.2 binary operation
2.1.3 integer division
2.1.4 divisibility
2.1.5 linear diophantine equation
2.2 modular operation < > 2.2.5 inverse
2.2.6 addition table and multiplication table
2.2.7 differences between addition set and multiplication set
2.2.8 other two sets
2.3 matrix
2.3.1 definition
2.3.2 operation and relationship < Equation
2.4.2 Linear equations
2.5 Recommended reading
2.6 Key terms
2.7 Summary
2.8 Problem sets
Chapter 3 Traditional Symmetric Key Cryptography
3.1 Introduction
3.1.1 Kerckhoff Principle
3.1. Single-code substitution cipher
3.2.2 Multi-code substitution cipher
3.3 transposition cipher
3.3.1 keyless transposition cipher
3.3.2 keyed transposition cipher
3.3.3 Combine the two methods
3.4 stream cipher and block cipher
3. Key terms
3.7 Summary
3.8 Problem Set
Chapter 4 Cryptography Part II: Algebraic Structure
4.1 Algebraic Structure
4.1.1 Group
4.1.2 Ring
4.1.3 Field
4.1.4 Summary. P>4.3 It is recommended to read
4.4 Key Terms
4.5 Summary
4.6 Problem Set
Chapter 5 Modern Symmetric Key Cryptography
5.1 Modern Block Cryptography
5.1.1 Substitution and transposition
5.1.2 as the block cipher of permutation group
5.1. 6 two kinds of product ciphers
5.1.7 attacks on block ciphers
5.2 modern stream ciphers
5.2.1 synchronous stream ciphers
5.2 asynchronous stream ciphers
5.3 recommended reading
5.4 key terms
5.5 summary
5.6 problem sets. ES) A brief history
6.1.2 Overview
Structure of p>6.2 DES
6.2.1 Initial permutation and final permutation
6.2.2 Round
6.2.3 Cryptography and Reverse Cryptography
6.2.4 Example
6.3 DES Analysis < 6.4.1 Double DES
6.4.2 Triple DES
6.5 DES Security
6.5.1 Brute Force Attack
6.5.2 Differential Cryptanalysis
6.5.3 Linear Cryptanalysis
6.6 Recommended reading
6.7 Key terms < P>7.1.1 brief history of advanced encryption standard (AES)
7.1.2 standard
7.1.3 rounds
7.1.4 data unit
7.1.5 structure of each round
7.2 transformation
7.2.1. Key extension in 28
p>7.6 AES-192 and AES-256
7.3.3 Key extension analysis
7.4 Password
7.4.1 Source design
7.4.2 Selective design
7.5 Example
7. P>7.7 Recommended reading
7.8 Key terms
7.9 Summary
7.1 Problem Set
Chapter 8 Encryption with Modern Symmetric Key Cryptography
8.1 Application of Modern Block Cipher
8.1.1 Electronic codebook mode
8.1.2 Block Cipher Link (CBC) mode. FB) mode
8.1.5 counter (CTR) mode
application of p>8.2 stream cipher
8.2.1 RC4
8.2.2 A5/ 1
8.3 Other Issues
p>9.1 Key Management
8.3.2 Key Generation
8.4 Recommended reading
8.5 Key terms
8.6 Summary
8.7 Problem Set
Part II Asymmetric Key Encryption
Chapter 9 Cryptography Part III. (n)) Function
9.1.5 Fermat (Fermat) Theorem
9.1.6 Euler Theorem
9.1.7 Generating Prime Number
9.2 Prime Test
9.2.1 Deterministic Algorithm
9.2.2 Probability Algorithm < Methods
9.3.3 Fermat method 248
9.3.4 Pollard P–1 method
9.3.5 Pollard rho method
9.3.6 More effective method
9.4 China remainder theorem
9.5 quadratic congruence
9. Exponent and Logarithm
9.6.1 Exponent
9.6.2 Logarithm
9.7 Recommended reading
9.8 Key terms
9.9 Summary
9.1 Problem Set
Chapter 1 Asymmetric Key Cryptography
1.1 Introduction
1.1. Function
1.1.5 knapsack cryptosystem
1.2 RSA cryptosystem
1.2.1 Introduction
1.2.2 Process
1.2.3 Some common examples
1.2.4 Attacks against RSA
1.2. BIN cryptosystem
1.3.1 process
1.3.2 Rabin system security
1.4 ELGAMAL cryptosystem
1.4.1 ElGamal cryptosystem
1.4.2 process
1.4.3 proof
1. > 1.5 elliptic curve cryptosystem
1.5.1 elliptic curve based on real number
1.5.2 elliptic curve based on GF( p)
1.5.3 elliptic curve based on GF(2n)
1.5.4 elliptic curve encryption system simulating ElGamal
1. Set
part ⅲ integrity, Authentication and key management
chapter p>11 information integrity and information authentication
11.1 information integrity
11.1.1 document and fingerprint
11.1.2 information and information abstract
11.1.3 difference
11.1.4 inspection integrity
11.1. .2.2 birthday problem
11.2.3 attack on random prediction model
11.2.4 attack on structure
11.3 information verification
11.3.1 modify detection code
11.3.2 information verification code (MAC)
11.4 recommended reading < Ash function
12.1 Introduction
12.1.1 Iterative hash function
12.1.2 Two sets of compression functions
12.2 SHA-512
12.2.1 Introduction
12.2.2 Compression function
12.2.3. Conclusion
12.3.3 Analysis
12.4 Recommended reading
12.5 Key terms
12.6 Summary
12.7 Problem sets
Chapter 13 Digital signature
13.1 Comparison
13.1 Inclusion
13. Key requirements
13.2.2 abstract signature
13.3 service
13.3.1 information authentication
13.3.2 information integrity
13.3.3 non-repudiation
13.3.4 confidentiality
13.4 for digital signatures. 3.5.1 RSA digital signature scheme
13.5.2 ElGamal digital signature scheme
13.5.3 Schnorr digital signature scheme
13.5.4 digital signature standard (DSS)
13.5.5 elliptic curve digital signature scheme
13.6 changes and applications
.
13.8 Key terms
13.9 Summary
13.1 Problem Set
Chapter 14 Entity Verification
14.1 Introduction
14.1.1 Data source verification and entity verification
14.1.2 Types of verification
14.1.3 Entity verification and. > 14.3 challenge-answer
14.3.1 application of symmetric key cipher
14.3.2 application of hash function with key
14.3.3 application of asymmetric key cipher
14.3.4 application of digital signature
14.4 zero knowledge
14.4. On
14.4.3 Guillou-Quisquater Protocol
14.5 Biological Testing
14.5.1 Equipment
14.5.2 Registration
14.5.3 Verification
14.5.4 Technology
14. P>14.9 problem set
Chapter 15 Key Management
15.1 Symmetric Key Distribution
15.2 KERBEROS
15.2.1 Server
15.2.2 Operation
15.2.3 Application of different servers
15.2.4 Kerberos. Diffie-Hellman key agreement
15.3.2 station-to-station key agreement
15.4 public key distribution
15.4.1 public key publication
15.4.2 trusted center
15.4.3 control of trusted center
15.4.4 certification authority
.
Time revolves around the bamboo horse and goes to the end of time.
I never envied anyone when you were with me.
H
Student accommodation application 1
Dear school leaders:
Hello!
I'm XX from Class XX, Grade XX. Some time ago, I wa