CONTENTS
1 THE ELEMENTS OF COMPUTER SECURITY
Password/Key Storage and Theft
Pseudo-Random-Number Generators (PRGs)
Hardware-Based Random-Number Generators
Hybrid Hardware/Software Random-Number Generators
2 CRYPTOGRAPHY APPROACHES AND ATTACKS
International Data-Encryption Algorithm
The Birthday Paradox and Hash Algorithms
3 KEY GENERATION AND DISTRIBUTION APPROACHES AND ATTACKS
Other Hardware Sources of Randomness
Key Distribution for Software-Based PRGs
Key Distribution for Hardware-Based RNGs
Minimizing Hardware Attack Risks
4 THE QUALITIES OF WORKABLE SECURITY SOLUTIONS
Get Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.