1.3 The Open Systems Interconnection Security Architecture
CHAPTER 2 Mathematics of Modern Cryptography
2.1.4 Greatest Common Divisor Computation
2.2.1 Secure Multicasting using CRT
2.2.2 Implementation of CRT in JAVA
2.3 Fermat’s and Euler’s Theorem
2.4.5 Legendre and Jacobi Symbols
2.5.2 Sieve of Eratosthenes Method
2.5.4 Miller–Rabin Primality Test
2.6.1 Prime Factorization Method
2.6.3 Fermat’s Factorization Method
CHAPTER 3 Classical Encryption Techniques
3.1.1 The Conventional Encryption Model
3.2.5 Vernam One-Time Pad Cipher
3.4.1 Modern Steganography Techniques
3.4.2 Attacks on Steganography
3.5 Linear Feedback Shift Registers
3.5.1 Linear Recurrence Relation
CHAPTER 4 Data Encryption Standard
4.1 Simplified Data Encryption Standard
4.2.1 DES Encryption and Decryption
4.3.2 Differential Cryptanalysis
4.4.1 Electronic Code Book Mode
4.4.2 Cipher Block Chaining Mode
Chapter 5 Secure Block Cipher and Stream Cipher Technique
5.1 Need for Double DES and Triple DES
5.2.1 Meet-in-the-Middle Attack
5.4 Pseudo Random Number Generator
5.4.1 Linear Congruential Generator
5.4.2 Blum Blum Shub Generator
5.5.2 The Key-scheduling Algorithm
5.5.3 The Pseudo Random Generation Algorithm
5.5.4 Encryption and Decryption
5.7 International Data Encryption Algorithm
5.7.3 IDEA Encryption and Decryption
5.8.3 Encryption and Decryption
Chapter 6 Advanced Encryption Standard (AES)187
6.1 AES Introduction (GF(2n))187
6.2 Working Principle of the AES
6.3 AES Encryption and Decryption
6.4 AES Key Expansion Algorithm
6.5 AES Exercises Based on GF (28)197
Chapter 7 Public Key Cryptosystem
7.1 Introduction to Public-Key Cryptosystem
7.4 JAVA Implementation of RSA
7.5.2 Superincreasing Knapsack
7.5.3 Encryption and Decryption Algorithm for Knapsack Cryptosystem
7.5.4 Secret Communication using Knapsack
Chapter 8 Key Management and Key Distribution
8.1 Introduction to Key Management
8.2 Centralized vs Distributed Key Management
8.3 Diffie–Hellman Key Exchange
8.3.1 Diffie–Hellman Key Exchange Algorithm
8.4 Computing Discrete Logarithms
8.6 JAVA Implementation of Diffie–HellmanKey Exchange Algorithm
8.7 Secure Multicast Communication Based onDiffie–Hellman Key Exchange
8.7.2 Key Computation Protocol
8.8 Computation-Efficient Secure Multicast KeyManagement Based on Greatest Common Divisor
8.8.2 Clustered Tree-based Key ManagementScheme
8.9 JAVA Implementation of Secure Multicast KeyManagement Based on GCD
Chapter 9 Elliptic Curve Cryptography
9.2.1 Elliptic Curve Operations
9.2.2 Geometric Description of Addition
9.2.3 Arithmetic Description of Point Addition
9.2.5 Elliptic Curve Over Zp261
9.3 Diffie–Hellman Key Exchange using Elliptic Curves
9.4 Elgamal Cryptosystem using Elliptic Curves
9.5 ECC-Based Elgamal Digital Signature
Chapter 10 Authentication Techniques
10.1.1 Message AuthenticationRequirements
10.1.2 Message Authentication Functions
10.2.1 Requirements of Hash Functions
10.2.2 Security of Hash Functions
10.3 Message Authentication Code
10.4 Authentication Algorithms
10.4.5 Hash Message Authentication Code
11.1 Introduction to Digital Signature
11.1.1 Uses of Digital Signature
11.1.2 Comparison of Digital Signature withDigital Certificate
11.1.3 Digital Signature Standard
11.2 Digital Signature Schemes
11.2.1 ElGamal Signature Scheme299
11.2.4 Fiat–Shamir Signature Scheme
11.2.5 Lamport Signature Scheme
11.2.6 Chaum–Antwerpen Undeniable Signature Scheme
11.2.7 Chaum’s Blind Signature Scheme
11.2.8 Ong–Schnorr–Shamir Subliminal ChannelSignature Scheme
11.2.9 Heyst–Pedersen Signature Scheme
11.2.10 Probabilistic Signature Scheme
11.3 Batch Digital Signature Algorithm
11.3.1 Naccache et al. Batch Verification Algorithm
11.4 Attacks On Digital Signature
11.5 Merits and Demerits of Digital Signature Schemes
11.6 Java Implementation of DSA
11.6.2 DSA Implementation using JCA
11.6.3 Security Considerations while ImplementingDigital Signature
11.6.4 Simple Batch Processing of DSA
Chapter 12 Authentication Applications
12.2 X.509 Authentication Services
12.2.2 Version 3 X.509 Certificates
12.3 Public Key Infrastructure
12.3.2 PKI Management Operations
Chapter 13 Application Layer Security
13.1.1 Web Security Threats and Countermeasures
13.2 Secure Electronic Transaction
13.3.2 Secure/Multipurpose Internet Mail Extensions 349
13.5 Secure Hypertext Transfer Protocol
Chapter 14 Transport Layer Security
14.3 Wireless Transport Layer Security
14.4 Comparison of SSL and TLS 367
15.4 IPsec Authentication Header
15.4.2 AH Datagram Placement and Linking
15.5 IPsec Encapsulating Security Payload
15.5.2 ESP Field Calculation and Placement
15.7 Security Issues with IPsec
16.1.3 Password Management System 384
16.2.2 Malware Propagation 385
16.3.5 The Attacks on the System
16.4.1 Intrusion Detection System
16.5.1 DB Security Requirements
16.5.2 DB Vulnerabilities and Attacks
16.5.4 SQL Injection Countermeasures
Appendix: Frequently Asked University Questions with Solutions