With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

No credit card required

Book Description

This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required

Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods.

The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography.

• Concisely explains complex formulas and equations and makes the math easy
• Teaches even the information security novice critical encryption skills
• Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world

1. Cover
2. Title Page
4. Dedication
6. Contents at a Glance
7. Contents
8. Acknowledgments
9. Introduction
10. PART I Foundations
1. CHAPTER 1 History of Cryptography to the 1800s
1. Why Study Cryptography?
2. What Is Cryptography?
3. Substitution Ciphers
4. Transposition Ciphers
5. Combinations
6. Conclusions
8. Endnotes
2. CHAPTER 2 History of Cryptography from the 1800s
1. Cryptography Marches On
2. Cryptography Comes of Age
3. The NSA: The Early Years
4. Conclusions
6. Endnotes
3. CHAPTER 3 Basic Information Theory
1. The Information Age
2. Claude Shannon
3. Core Concepts of Cryptography
4. Scientific and Mathematical Theories
5. Binary Math
6. Conclusions
8. Endnotes
4. CHAPTER 4 Essential Number Theory and Discrete Math
1. Number Systems
2. Prime Numbers
3. Relatively Prime, or Co-prime, Numbers
4. Important Operations
5. Famous Number Theorists and Their Contributions
6. Discrete Mathematics
7. Conclusions
9. Endnote
5. CHAPTER 5 Essential Algebra
1. Abstract Algebraic Structures
2. Diophantine Equations
3. Matrix Math
4. Algorithms
5. History Highlights
6. Conclusions
8. Endnote
11. PART II Symmetric Ciphers and Hashes
1. CHAPTER 6 Feistel Networks
1. Cryptographic Keys
2. Feistel Function
4. MDS Matrix
5. Lucifer
6. DES
7. S-Box and P-Box
8. GOST
9. Blowfish
10. Twofish
11. Skipjack
12. CAST
13. FEAL
14. MARS
15. TEA
16. LOKI97
17. Camellia
18. ICE
19. Simon
20. Symmetric Methods
21. Conclusions
23. Endnotes
2. CHAPTER 7 Substitution-Permutation Networks
1. Replacing DES
3. Serpent Algorithm
4. Square
5. SHARK
6. SAFER Ciphers
8. NESSIE
9. Stream Ciphers
11. Conclusions
13. Endnotes
3. CHAPTER 8 S-Box Design
1. Why Study S-Box Design?
3. The DES S-Box
4. The Rijndael S-Box
5. Conclusions
7. Endnotes
4. CHAPTER 9 Cryptographic Hashes
1. What Is a Cryptographic Hash?
2. How Are Cryptographic Hashes Used?
3. Merkle-Damgård
4. Specific Algorithms
5. Attacks on Hashes
6. Salt
7. MAC and HMAC
8. Conclusions
10. Endnotes
12. PART III Asymmetric Ciphers
1. CHAPTER 10 Common Algorithms
1. What Is Asymmetric Cryptography?
2. The Rabin Cryptosystem
3. Diffie-Hellman
4. ElGamal
5. MQV
7. Cramer-Shoup
8. Applications
9. Homomorphic Encryption
10. Conclusions
12. Endnote
2. CHAPTER 11 Elliptic Curve Cryptography
1. General Overview
2. The Algorithm
3. ECC Variations
4. Conclusions
6. Endnotes
13. PART IV Applications
1. CHAPTER 12 Random Number Generators
1. What Makes a Good PRNG?
2. Specific Algorithms
3. The Marsaglia CD-ROM
4. Improving PRNGs
5. Conclusions
7. Endnotes
2. CHAPTER 13 Secure Sockets Layer/Transport Layer Security Protocol
1. Digital Signatures
2. Digital Certificates
3. Public-Key Infrastructure X.509
4. SSL and TLS Protocol Basics
5. Conclusions
7. Endnotes
3. CHAPTER 14 Virtual Private Networks
1. Authentication
2. PPTP
3. L2TP
4. IPSec
5. SSL/TLS
6. Other Secure Communications
7. Conclusions
9. Endnotes
4. CHAPTER 15 Military Applications
1. NSA and Cryptography
2. U.S. Cryptography Laws and Regulations
3. Cryptography in Other Nations
4. Cryptography and Malware
5. Conclusions
7. Endnotes
5. CHAPTER 16 Steganography
1. Steganography Basics
2. Steganography History
3. Steganography Methods and Tools
4. Current Uses of Steganography
5. Steganalysis
6. Distributed Steganography
7. Conclusions
9. Endnotes
6. CHAPTER 17 Cryptanalysis
1. Classic Cryptanalysis Methods
2. Modern Methods
3. Asymmetric Cryptanalysis and RSA
4. General Rules for Cryptanalysis
5. Rainbow Tables
7. Other Methods
8. Resources
9. Conclusions
11. Endnotes
7. CHAPTER 18 Cryptographic Backdoors
1. What Are Cryptographic Backdoors?
2. General Properties
3. Other Ways to Compromise Cryptography
4. The Prevalence of Backdoors
5. Countermeasures
6. Conclusions