You are previewing Applied Cryptography for Cyber Security and Defense.
O'Reilly logo
Applied Cryptography for Cyber Security and Defense

Book Description

In today’s information age, the security of digital communication and transactions is of critical importance. Cryptography is the traditional, yet effective, practice of concealing personal information in cyberspace. Applied Cryptography for Cyber Security and Defense: Information Encryption and Cyphering applies the principles of cryptographic systems to real-world scenarios, explaining how cryptography can protect businesses’ information and ensure privacy for their networks and databases. It delves into the specific security requirements within various emerging application areas and discusses procedures for engineering cryptography into system design and implementation.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. List of Reviewers
  5. Dedication
  6. Preface
    1. SECTION 1: CRYPTOGRAPHY IN NETWORKING AND CYBER SPACE
    2. SECTION 2: CRYPTOGRAPHY IN E-MAIL AND WEB SERVICES
    3. SECTION 3: CRYPTOGRAPHY IN WIRELESS COMMUNICATION
    4. SECTION 4: CRYPTOGRAPHY IN ELECTRONIC COMMERCE
    5. SECTION 5: CRYPTOGRAPHY IN EMERGING AREAS
  7. Section 1: Cryptography in Networking and Cyber Space
    1. Chapter 1: Network Security
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. CONFIDENTIALITY AND INTEGRITY
      5. ONLINE ANONYMITY
      6. AVAILABILITY
      7. KEY MANAGEMENT
      8. WIRELESS AVAILABILITY—JAM RESISTANCE
      9. OPEN PROBLEMS
    2. Chapter 2: Cryptography-Based Authentication for Protecting Cyber Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CRYPTOGRAPHY IN KNOWLEDGE-BASED AUTHENTICATION
      5. CRYPTOGRAPHY KEY-BASED TOKEN AUTHENTICATION AND AUTHENTICATED KEY EXCHANGE
      6. FUZZY EXTRACTORS FOR BIOMETRIC AUTHENTICATION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
      9. Appendix
  8. Section 2: Cryptography in E-Mail and Web Services
    1. Chapter 3: E-Mail, Web Service and Cryptography
      1. Abstract
      2. INTRODUCTION
      3. Definition and History
      4. CRYPTOGRAPHY
      5. Cryptography Terminology (Public-Key Cryptosystems, 2008)
      6. PRACTICAL CRYPTOSYSTEMS
      7. ASYMMETRIC ALGORITHMS
      8. ELLIPTIC CURVES OVER REAL NUMBERS
      9. OTHER ALGORITHMS
      10. SUITE B INCLUDES:
      11. WEB SERVICES
      12. CONCLUSION
    2. Chapter 4: Cryptography in E-Mail and Web Services
      1. Abstract
      2. Introduction
      3. Email Encryption integration
      4. PGP: Pretty Good Privacy (AL-Hamdani, PGPAL-Hamdani, PGP: Pretty Good Privacy, 2009) (Schneier, Applied Cryptography, 1995) (Zimmermann, PGP Source Code and Internals, 1995) (wikipedia.org, PGPPGP: PRETTY GOOD PRIVACY, 2009) (Zimmermann, The Official PGP User's Guide, 1995)
      5. OpenPGP (wikipedia.org,Open PGP, 2009) (Callas, Donnerhacke, Finney, & Thayer, OpenPGP Message Format RFC: 4880, 2007)
      6. Gnu Privacy Guard
      7. Choosing an Appropriate Encryption Algorithm (Tracy, Jansen and Bisker 2002)
      8. PGP or S/MIME
      9. MIME Security with OpenPGP (Elkins, Torto, Levien, & Roessler, 2001)
      10. Web-basED E-mail
      11. Secure Sockets Layer (SSL) (Dierks & Allen, 1999) (Hoffman, 1999) (Thomas, 2000) (sun.com, 2002) (wikipedia.org, SSL,2009)
      12. cryptography in Web services
      13. Authentication options
      14. XML Key Registration Service Specification (XKRSS)
      15. Bulk registration of key pairs (X-Bulk)
      16. XML Key Information Service Specification (XKISS)
      17. OASIS (OASIS, 2009)
      18. SAML
      19. SAML delivers the following benefits: (Netegrity, 2001)
      20. SAML Scope and Purpose (Netegrity, 2001)
      21. Security of Infrastructures for Web Services
      22. Involved in EAI/Middleware:
      23. Future of Web service security
      24. Conclusion
    3. Chapter 5: Applied Cryptography in E-mail Services and Web Services
      1. ABSTRACT
      2. INTRODUCTION
      3. Commonly Used Cryptographic Ciphers and Security Protocols
      4. Security Standards
      5. Public Key Infrastructure (PKI)
      6. Applied Cryptography in E-mail Services
      7. Pretty Good Privacy (PGP) and OpenPGP
      8. Secure/Multipurpose Internet Mail Extension (S/MIME)
      9. S/MIME v3 vs. OpenPGP
      10. Applied Cryptography in Web Services
      11. Summary
  9. Section 3: Cryptography in Wireless Communication
    1. Chapter 6: Applied Cryptography in Wireless Sensor Networks
      1. Abstract
      2. Introduction
      3. Key Management
      4. Security Protocols for Sensor Networks (SPINs)
      5. Localized Encryption Authentication Protocol (LEAP)
      6. Link Layer Security Protocol: TinySec
      7. Path Key Establishment
      8. Authentication, Integrity, Confidentiality and Data Freshness
      9. Public Key Cryptography for Wireless Sensor Networks
      10. ECC Implementation for Wireless Sensor Networks
      11. Identity Based Encryption
      12. Future Research Directions
      13. Conclusion
    2. Chapter 7: Applied Cryptography in Infrastructure-Free Wireless Networks
      1. Abstract
      2. Introduction
      3. Cryptographic Tools
      4. Applications of Threshold Cryptography in MANET
      5. Challenges and Solutions in Securing Wireless Sensor Networks
      6. 1.5 Conclusions
  10. Section 4: Cryptography in Electronic Commerce
    1. Chapter 8: Applied Cryptography in Electronic Commerce
      1. Abstract
      2. Introduction
      3. Background
      4. AUTHENTICATION ON THE WEB
      5. Identity Management
      6. Digital Rights Management
      7. ITunes
      8. Future Trends and threats in electronic commerce
      9. Conclusion
    2. Chapter 9: An Electronic Contract Signing Protocol Using Fingerprint Biometrics
      1. Abstract
      2. Introduction
      3. Fair Electronic Exchange
      4. Micali’s Electronic Contract Signing Protocol
      5. Bao’s Electronic Contract Signing Protocol
      6. Our System
      7. Analysis
      8. Conclusion
  11. Section 5: Cryptography in Emerging Areas
    1. Chapter 10: Secure and Private Service Discovery in Pervasive Computing Environments
      1. Abstract
      2. INTRODUCTION
      3. BACKGROUND
      4. PRUDENTEXPOSURE SERVICE DISCOVERY
      5. PROGRESSIVE AND PROBABILISTIC EXPOSURE
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    2. Chapter 11: Multimedia Information Security
      1. ABSTRACT
      2. Introduction to Encryption
      3. Image Encryption
      4. Joint Compression-Encryption Methodologies
      5. Video Encryption
      6. Introduction to Image/Video Information Hiding
      7. Low Bitrate Information Hiding Algorithms
      8. High Bitrate Information Hiding Algorithms
      9. Embedding Strategies for Digital Videos
      10. Summary
    3. Chapter 12: Secure Electronic Voting with Cryptography
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SECURITY PROPERTIES OF COMPUTER VOTING: ISSUES AND CHALLENGES
      5. BUILDING BLOCKS
      6. CRYPTOGRAPHY-BASED EVOTING SCHEME
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    4. Chapter 13: Biometric Security in the E-World
      1. Abstract
      2. Introduction
      3. Security Challenges in the E-World
      4. ICT, Trust, Privacy& Security
      5. User Authentication Methods
      6. Biometrics- Clarifying Enrollment, Verification and Identification
      7. Stages in the Functioning of a Biometric System
      8. Types of Biometric Systems
      9. Advantages and Drawbacks of Biometric Techniques
      10. Performance Measurement in Biometrics
      11. Usability and Accessibility Concerns About Biometrics
      12. Public Misconceptions about Biometrics
      13. Future Directions in Biometric Security
      14. Conclusion
  12. Compilation of References
  13. About the Contributors