You are previewing Theory and Practice of Cryptography Solutions for Secure Information Systems.
O'Reilly logo
Theory and Practice of Cryptography Solutions for Secure Information Systems

Book Description

Information Systems (IS) are a nearly omnipresent aspect of the modern world, playing crucial roles in the fields of science and engineering, business and law, art and culture, politics and government, and many others. As such, identity theft and unauthorized access to these systems are serious concerns. Theory and Practice of Cryptography Solutions for Secure Information Systems explores current trends in IS security technologies, techniques, and concerns, primarily through the use of cryptographic tools to safeguard valuable information resources. This reference book serves the needs of professionals, academics, and students requiring dedicated information systems free from outside interference, as well as developers of secure IS applications. This book is part of the Advances in Information Security, Privacy, and Ethics series collection.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
  5. Editorial Advisory Board and List of Reviewers
    1. Editorial Advisory Board
    2. List of Reviewers
  6. Foreword
  7. Preface
  8. Acknowledgment
  9. Section 1: Cryptographic Methods Analysis
    1. Chapter 1: Ontology-Based Analysis of Cryptography Standards and Possibilities of Their Harmonization
      1. ABSTRACT
      2. INTRODUCTION
      3. BASIC PROBLEMS
      4. HYBRID TECHNOLOGY
      5. HARMONIZATION OF BEHAVIOR
      6. SYNTAX GRAPH TRANSFORMATIONS IN SYNGT SYSTEM
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    2. Chapter 2: GOST Encryption Algorithm and Approaches to its Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. DIFFERENTIAL CRYPTANALYSIS
      5. ALGEBRAIC CRYPTANALYSIS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    3. Chapter 3: Cryptography for the Forensics Investigator
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FUNDAMENTALS
      5. PRESERVING EVIDENCE USING HASH FUNCTIONS
      6. ENCOUNTERING ENCRYPTION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    4. Chapter 4: Search in Encrypted Data
      1. ABSTRACT
      2. INTRODUCTION
      3. SED APPLICATION SCENARIOS
      4. CATEGORIZATION OF SED SCHEMES
      5. SED SECURITY MODELS
      6. PRACTICALITY ANALYSIS
      7. CONCLUSION
  10. Section 2: Cryptographic Systems
    1. Chapter 5: Encryption Schemes with Hyper-Complex Number Systems and Their Hardware-Oriented Implementation
      1. ABSTRACT
      2. INTRODUCTION
      3. QES DETAILS
      4. ATTACKS ON QES
      5. QES MODIFICATION M-QES
      6. HARDWARE-ORIENTED QES (HW-QES)
      7. OES DETAILS
      8. EXPERIMENTAL RESULTS AND DISCUSSIONS
      9. STATISTICAL ANALYSIS AND CRYPTANALYSIS RESISTANCE
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
      12. APPENDIX
    2. Chapter 6: Design Time Engineering of Side Channel Resistant Cipher Implementations
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. OVERVIEW OF HARDWARE DESIGN WORKFLOW
      5. METHODOLOGY FOR POWER ANALYSIS AT DESIGN TIME
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
  11. Section 3: Cryptographic Solutions for Distributed Systems
    1. Chapter 7: An Efficient Attribute-Based Signature with Application to Secure Attribute-Based Messaging System
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND STUDY ABOUT ABS
      4. MATHEMATICAL AND SECURITY MODEL
      5. SECURITY ASSUMPTIONS
      6. DESCRIPTION OF THE ABS SCHEME
      7. SECURITY PROOF
      8. PERFORMANCE ANALYSIS
      9. APPLICATION TO SECURE ATTRIBUTE-BASED MESSAGING SYSTEM
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
      12. ACKNOWLEDGMENT
    2. Chapter 8: SEcure Neighbor Discovery
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE MAIN CHALLENGES AND LIMITATIONS OF SEND
      5. FUTURE RESEARCH DIRECTIONS TO FACILITATE SEND DEPLOYMENTS AND PROTECT LOCAL IPV6 NETWORK
      6. CONCLUSION
    3. Chapter 9: Offline/Online Security in Mobile Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. OFFLINE/ONLINE AKA SCHEMES
      5. OFFLINE/ONLINE NON-REPUDIATION
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    4. Chapter 10: A Survey on Security in Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. ATTACKS AND DEFENSE MECHANISMS
      4. OPEN ISSUES AND FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
  12. Section 4: Cryptographic Trust Solutions
    1. Chapter 11: Secure Multiparty Computation via Oblivious Polynomial Evaluation
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODS TO SOLVE SMC PROBLEMS
      5. IMPLEMENTATION OF OPE PROTOCOL
      6. SECURE MULTIPARTY COMPUTATION VIA OBLIVIOUS POLYNOMIAL EVALUATION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    2. Chapter 12: PKI Trust Models
      1. ABSTRACT
      2. INTRODUCTION
      3. PKI TRUST STRUCTURES
      4. SEMANTICS OF TRUST AND IDENTITY
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    3. Chapter 13: Entity Authentication and Trust Validation in PKI Using Petname Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITION
      4. PUBLIC KEY INFRASTRUCTURE
      5. BACKGROUND OF PETNAME SYSTEMS
      6. THE PETNAME MODEL
      7. PROPERTIES OF PETNAME SYSTEMS
      8. PKI AND PETNAME SYSTEMS
      9. OTHER APPLICATION DOMAINS
      10. EVALUATION OF SECURITY USABILITY FOR PKI-BASED PETNAME SYSTEM
      11. FUTURE WORK
      12. CONCLUSION
    4. Chapter 14: Building a Trusted Environment for Security Applications
      1. ABSTRACT
      2. INTRODUCTION
      3. TRUSTED COMPUTING
      4. BUILDING A TRUSTED ENVIRONMENT
      5. WRITING APPLICATIONS THAT USE THE TPM
      6. RELATED WORKS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    5. Chapter 15: Enhancing Security at Email End Point
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. EXISTING EMAIL SECURITY MODELS
      5. FINGERPRINT SYSTEMS
      6. FINGERPRINT-BASED EMAIL SECURITY MODEL
      7. ANALYSIS OF FINGERPRINT BASED EMAIL SECURITY MODEL
      8. FURTHER RESEARCH DIRECTIONS
      9. CONCLUSION
      10. ACKNOWLEDGMENT
  13. Section 5: Engineering Secure Information Systems
    1. Chapter 16: Cryptography in Electronic Mail
      1. ABSTRACT
      2. INTRODUCTION
      3. ELECTRONIC MAIL (EMAIL)
      4. CRYPTOGRAPHIC PROTECTION MECHANISMS
      5. FUTURE RESEARCH DIRECTIONS TO SECURE EMAIL
      6. CONCLUSION
    2. Chapter 17: Theory and Practice of Secure E-Voting Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ISSUES, CONTROVERSIES, PROBLEMS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. EXTENSION AND APPLICATION
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 18: Sealed-Bid Auction Protocols
      1. ABSTRACT
      2. INTRODUCTION
      3. MAIN FOCUS OF THE CHAPTER
      4. SOLUTIONS AND RECOMMENDATIONS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    4. Chapter 19: Preserving the Privacy of Patient Records in Health Monitoring Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURING EHRS IN E-HEALTH
      4. RELATED SECURITY WORKS
      5. REMOTE HEALTH MONITORING SYSTEMS
      6. UBIQUITOUS HEALTH TRUST PROTOCOL
      7. IMPLEMENTATION
      8. FUTURE RESEARCH DIRECTIONS: OPEN TOPIC- PRIVACY
      9. CONCLUSION
  14. Compilation of References
  15. About the Contributors