Current location - Quotes Website - Signature design - Directory of Cryptography and Network Security
Directory of Cryptography and Network Security

Introduction to Chapter 1

1.1 Security objective

1.1.1 Confidentiality

1.1.2 Integrity

p>1.3 Availability

1.2 Attacks

1.2.1 Attacks that threaten confidentiality

1.2.2. > 1.3.1 security service

1.3.2 security mechanism

1.3.3 relationship between service and mechanism

1.4 technology

1.4.1 cryptography

1.4.2 steganography

1.5 the rest of this book

Part I. Authentication and key management

Part IV Network security

1.6 Recommended reading

1.7 Key terms

1.8 Summary

1.9 Problem sets

Part I Symmetric key encryption

Chapter 2 Cryptography Part I: Modular algorithm, Congruence sum matrix

2.1 integer algorithm

2.1.1 integer set

2.1.2 binary operation

2.1.3 integer division

2.1.4 divisibility

2.1.5 linear diophantine equation

2.2 modular operation < > 2.2.5 inverse

2.2.6 addition table and multiplication table

2.2.7 differences between addition set and multiplication set

2.2.8 other two sets

2.3 matrix

2.3.1 definition

2.3.2 operation and relationship < Equation

2.4.2 Linear equations

2.5 Recommended reading

2.6 Key terms

2.7 Summary

2.8 Problem sets

Chapter 3 Traditional Symmetric Key Cryptography

3.1 Introduction

3.1.1 Kerckhoff Principle

3.1. Single-code substitution cipher

3.2.2 Multi-code substitution cipher

3.3 transposition cipher

3.3.1 keyless transposition cipher

3.3.2 keyed transposition cipher

3.3.3 Combine the two methods

3.4 stream cipher and block cipher

3. Key terms

3.7 Summary

3.8 Problem Set

Chapter 4 Cryptography Part II: Algebraic Structure

4.1 Algebraic Structure

4.1.1 Group

4.1.2 Ring

4.1.3 Field

4.1.4 Summary. P>4.3 It is recommended to read

4.4 Key Terms

4.5 Summary

4.6 Problem Set

Chapter 5 Modern Symmetric Key Cryptography

5.1 Modern Block Cryptography

5.1.1 Substitution and transposition

5.1.2 as the block cipher of permutation group

5.1. 6 two kinds of product ciphers

5.1.7 attacks on block ciphers

5.2 modern stream ciphers

5.2.1 synchronous stream ciphers

5.2 asynchronous stream ciphers

5.3 recommended reading

5.4 key terms

5.5 summary

5.6 problem sets. ES) A brief history

6.1.2 Overview

Structure of p>6.2 DES

6.2.1 Initial permutation and final permutation

6.2.2 Round

6.2.3 Cryptography and Reverse Cryptography

6.2.4 Example

6.3 DES Analysis < 6.4.1 Double DES

6.4.2 Triple DES

6.5 DES Security

6.5.1 Brute Force Attack

6.5.2 Differential Cryptanalysis

6.5.3 Linear Cryptanalysis

6.6 Recommended reading

6.7 Key terms < P>7.1.1 brief history of advanced encryption standard (AES)

7.1.2 standard

7.1.3 rounds

7.1.4 data unit

7.1.5 structure of each round

7.2 transformation

7.2.1. Key extension in 28

p>7.6 AES-192 and AES-256

7.3.3 Key extension analysis

7.4 Password

7.4.1 Source design

7.4.2 Selective design

7.5 Example

7. P>7.7 Recommended reading

7.8 Key terms

7.9 Summary

7.1 Problem Set

Chapter 8 Encryption with Modern Symmetric Key Cryptography

8.1 Application of Modern Block Cipher

8.1.1 Electronic codebook mode

8.1.2 Block Cipher Link (CBC) mode. FB) mode

8.1.5 counter (CTR) mode

application of p>8.2 stream cipher

8.2.1 RC4

8.2.2 A5/ 1

8.3 Other Issues

p>9.1 Key Management

8.3.2 Key Generation

8.4 Recommended reading

8.5 Key terms

8.6 Summary

8.7 Problem Set

Part II Asymmetric Key Encryption

Chapter 9 Cryptography Part III. (n)) Function

9.1.5 Fermat (Fermat) Theorem

9.1.6 Euler Theorem

9.1.7 Generating Prime Number

9.2 Prime Test

9.2.1 Deterministic Algorithm

9.2.2 Probability Algorithm < Methods

9.3.3 Fermat method 248

9.3.4 Pollard P–1 method

9.3.5 Pollard rho method

9.3.6 More effective method

9.4 China remainder theorem

9.5 quadratic congruence

9. Exponent and Logarithm

9.6.1 Exponent

9.6.2 Logarithm

9.7 Recommended reading

9.8 Key terms

9.9 Summary

9.1 Problem Set

Chapter 1 Asymmetric Key Cryptography

1.1 Introduction

1.1. Function

1.1.5 knapsack cryptosystem

1.2 RSA cryptosystem

1.2.1 Introduction

1.2.2 Process

1.2.3 Some common examples

1.2.4 Attacks against RSA

1.2. BIN cryptosystem

1.3.1 process

1.3.2 Rabin system security

1.4 ELGAMAL cryptosystem

1.4.1 ElGamal cryptosystem

1.4.2 process

1.4.3 proof

1. > 1.5 elliptic curve cryptosystem

1.5.1 elliptic curve based on real number

1.5.2 elliptic curve based on GF( p)

1.5.3 elliptic curve based on GF(2n)

1.5.4 elliptic curve encryption system simulating ElGamal

1. Set

part ⅲ integrity, Authentication and key management

chapter p>11 information integrity and information authentication

11.1 information integrity

11.1.1 document and fingerprint

11.1.2 information and information abstract

11.1.3 difference

11.1.4 inspection integrity

11.1. .2.2 birthday problem

11.2.3 attack on random prediction model

11.2.4 attack on structure

11.3 information verification

11.3.1 modify detection code

11.3.2 information verification code (MAC)

11.4 recommended reading < Ash function

12.1 Introduction

12.1.1 Iterative hash function

12.1.2 Two sets of compression functions

12.2 SHA-512

12.2.1 Introduction

12.2.2 Compression function

12.2.3. Conclusion

12.3.3 Analysis

12.4 Recommended reading

12.5 Key terms

12.6 Summary

12.7 Problem sets

Chapter 13 Digital signature

13.1 Comparison

13.1 Inclusion

13. Key requirements

13.2.2 abstract signature

13.3 service

13.3.1 information authentication

13.3.2 information integrity

13.3.3 non-repudiation

13.3.4 confidentiality

13.4 for digital signatures. 3.5.1 RSA digital signature scheme

13.5.2 ElGamal digital signature scheme

13.5.3 Schnorr digital signature scheme

13.5.4 digital signature standard (DSS)

13.5.5 elliptic curve digital signature scheme

13.6 changes and applications

.

13.8 Key terms

13.9 Summary

13.1 Problem Set

Chapter 14 Entity Verification

14.1 Introduction

14.1.1 Data source verification and entity verification

14.1.2 Types of verification

14.1.3 Entity verification and. > 14.3 challenge-answer

14.3.1 application of symmetric key cipher

14.3.2 application of hash function with key

14.3.3 application of asymmetric key cipher

14.3.4 application of digital signature

14.4 zero knowledge

14.4. On

14.4.3 Guillou-Quisquater Protocol

14.5 Biological Testing

14.5.1 Equipment

14.5.2 Registration

14.5.3 Verification

14.5.4 Technology

14. P>14.9 problem set

Chapter 15 Key Management

15.1 Symmetric Key Distribution

15.2 KERBEROS

15.2.1 Server

15.2.2 Operation

15.2.3 Application of different servers

15.2.4 Kerberos. Diffie-Hellman key agreement

15.3.2 station-to-station key agreement

15.4 public key distribution

15.4.1 public key publication

15.4.2 trusted center

15.4.3 control of trusted center

15.4.4 certification authority

.