Computer Security 3 e
Chapter 1: Cryptography
Cryptography
Origins of Cryptography
Old Paradigm intruder
New Paradigm TTP
Law Enforcement LEA
Communications Security
Cryptographic Keys
Shifting the Goal Post
Crypto in Computer Security
Modular Arithmetic
Fermat’s Little Theorem
Difficult Problems
Integrity Check Functions
One-way Functions
Collisions
Collision Resistance
Birthday Paradox
Checksums
Discrete Exponentiation
Construction
Construction
HMAC (simplified)
Digital signatures
Digital Signatures
Digital Signatures
One-time Signatures
Digital Signature Algorithm
Digital Signature Algorithm
RSA Signatures
RSA Signatures
Performance Gains
Factorization & RSA
MACs & Digital Signatures
Encryption
Terminology
Symmetric Key Encryption
Block Cipher Basics
Round Structure
Feistel Ciphers
Algorithms
Data Encryption Standard
Comments on Security
Using Encryption for Real
Electronic Code Book Mode
Error Propagation
Cipher Block Chaining Mode
Cipher Block Chaining Mode
Cipher Block Chaining Mode
A Note on Plaintexts
Cipher Feedback Mode
More Modes
Public key Encryption
Encryption with Public Keys
Public key Encryption
Public Key Infrastructures
RSA Encryption
RSA Encryption
Padding
Bleichenbacher’s Attack
Strength of Mechanisms
Performance
Performance
Comment on PKC