CONTENTS

1 THE ELEMENTS OF COMPUTER SECURITY

Cryptography

Symmetric Key Cryptography

Asymmetric Key Cryptography

Passwords and Keys

Password/Key Strength

Password/Key Storage and Theft

Passwords and Authentication

Something You Know

Something You Have

Something You Are

Random-Number Generators

Pseudo-Random-Number Generators (PRGs)

Hardware-Based Random-Number Generators

Hybrid Hardware/Software Random-Number Generators

Key Generation

Security and the Internet

References

2 CRYPTOGRAPHY APPROACHES AND ATTACKS

Symmetric Key Cryptography

One-Time Pad

DES and Triple DES

International Data-Encryption Algorithm

Rivest Cipher 4

Blowfish

Advanced Encryption Standard

Quantum Cryptography

Hash Algorithms

The Birthday Paradox and Hash Algorithms

References

3 KEY GENERATION AND DISTRIBUTION APPROACHES AND ATTACKS

Key Generation

Software Key Generation

Hardware Key Generation

Noise-Based Approaches

Noisy Diodes and Resistors

Radio-Frequency Sources

Brownian-Motion Devices

Quantum Devices

Nuclear Decay Devices

Optical Devices

Other Hardware Sources of Randomness

Key Distribution

Key Distribution for Software-Based PRGs

Key Distribution

Key Storage

Key Use

Key Distribution for Hardware-Based RNGs

Creation of RNGs

Initialization of RNGs

Distribution of RNGs

Key Storage and Use

Minimizing Hardware Attack Risks

References

4 THE QUALITIES OF WORKABLE SECURITY SOLUTIONS

Secure Coprocessors

Attack Vectors

Techniques for Creating Strong Coprocessors

Secure Bootstrap Loading

Protection of the Bootstrap ...

Get Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.