Applied Cryptography for Cyber Security and Defense. Information Encryption and Cyphering

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

CRC Press, 2011. — 408 p.
Cryptography is the art and science of concealment of information. Without the ability to conceal information, the current networked computing environment would not be possible. In the most fundamental way, cryptography provides a logical barrier to secure information from unauthorized prying eyes. To understand cryptography, we need to answer four simple yet interrelated questions: What information do we need to conceal? Why do we need to conceal it and from whom? How can we optimally conceal it without diminishing its usefulness? And finally, how do we reveal that which was concealed? The answers to these questions characterize the essence of information and what it represents.
This book gives guidelines to cryptographic systems with consideration of real-world constraints and opponents. Different systems have different constraints and opponents such as computation constraints, especially those in emerging areas. The constraints and opponents are analyzed first during requirements analysis, and then the cryptographic algorithms and services are selected to achieve the objective of cryptographic system. The system is evaluated against the requirements, constraints and possible threats from opponents. The book discusses applied cryptography as an engineering discipline to meet specific requirements in real-world applications. This book strives to bridge the gap between cryptographic theory and real-world cryptographic applications. This book also delves into the specific security requirements and opponents in various emerging application areas and discusses the procedure about engineering cryptography into system design and implementation. For example, wireless sensor networks have energy and computation as cryptographic constraints, entity authentication requires zero knowledge, electronic commence requires fair electronic exchange besides confidentiality, authentication, and integrity. Our main goal is to engineer cryptography into a real-world secure system and to bridge cryptographic algorithms and techniques with real-world constraints of a specific area. This book introduces how to build a secure system in real settings, which is the essence of applied cryptography in information security and privacy.
Section 1 Cryptography in Networking and Cyber Space.
Network Security.
Cryptography-Based Authentication for Protecting Cyber Systems.
Section 2 Cryptography in E-Mail and Web Services.
E-Mail, Web Service and Cryptography.
Cryptography in E-Mail and Web Services.
Applied Cryptography in E-Mail Services and Web Services.
Section 3 Cryptography in Wireless Communication.
Applied Cryptography in Wireless Sensor Networks.
Applied Cryptography in Infrastructure-Free Wireless Networks.
Section 4 Cryptography in Electronic Commerce.
Applied Cryptography in Electronic Commerce.
An Electronic Contract Signing Protocol Using Fingerprint Biometrics.
Section 5 Cryptography in Emerging Areas.
Secure and Private Service Discovery in Pervasive Computing Environments.
Multimedia Information Security: Cryptography and Steganography.
Secure Electronic Voting with Cryptography.
Biometric Security in the E-World.

Author(s): Nemati H.R., Yang L.

Language: English
Commentary: 1794707
Tags: Информатика и вычислительная техника;Информационная безопасность;Криптология и криптография