|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Dieses Lehrbuch gibt eine praxisnahe Einfuhrung in die
Informatik.
Zunachst werden die Grundlagen der Kodierung und der
Informationsdarstellung abgehandelt und Kontroll- und
Datenstrukturen vorgestellt. Anschliessend werden
Architekturmerkmale von Prozessoren (RISC und CISC) sowie
Mechanismen der Systemsteuerung wie Pipelining und Interrupts
erlautert. Es folgt eine Beschreibung der wichtigsten Funktionen
eines Betriebssystems wie die Organisation von Prozessen und die
Speicherverwaltung.
Die Darstellung erfolgt mittels des Modellprozessors MMIX, der von
Donald E. Knuth in seinem Standardwerk "The Art of Computer
Programming" entwickelt wurde. Die Funktionsweise dieses Prozessors
wird in einem eigenen Kapitel ausfuhrlich beschrieben. Ferner
werden die Programmierumgebung des MMIX und seine Assemblersprache
MMIXAL in erganzenden Anhangen zusammengestellt."
Privacy and Copyright protection is a very important issue in our
digital society, where a very large amount of multimedia data are
generated and distributed daily using different kinds of consumer
electronic devices and very popular communication channels, such as
the Web and social networks. This book introduces state-of-the-art
technology on data hiding and copyright protection of digital
images, and offers a solid basis for future study and research.
Steganographic technique overcomes the traditional cryptographic
approach, providing new solutions for secure data transmission
without raising users' malicious intention. In steganography, some
secret information can be inserted into the original data in
imperceptible and efficient ways to avoid distortion of the image,
and enhance the embedding capacity, respectively. Digital
watermarking also adopts data hiding techniques for copyright
protection and tampering verification of multimedia data. In
watermarking, an illegitimate copy can be recognised by testing the
presence of a valid watermark and a dispute on the ownership of the
image resolved. Different kinds of steganographic and watermarking
techniques, providing different features and diverse
characteristics, have been presented in this book. This book
provides a reference for theoretical problems as well as practical
solutions and applications for steganography and watermarking
techniques. In particular, both the academic community (graduate
student, post-doc and faculty) in Electrical Engineering, Computer
Science, and Applied Mathematics; and the industrial community
(engineers, engineering managers, programmers, research lab staff
and managers, security managers) will find this book interesting.
QUANTUM BLOCKCHAIN While addressing the security challenges and
threats in blockchain, this book is also an introduction to quantum
cryptography for engineering researchers and students in the realm
of information security. Quantum cryptography is the science of
exploiting quantum mechanical properties to perform cryptographic
tasks. By utilizing unique quantum features of nature, quantum
cryptography methods offer everlasting security. The applicability
of quantum cryptography is explored in this book. It describes the
state-of-the-art of quantum blockchain techniques and sketches how
they can be implemented in standard communication infrastructure.
Highlighting a wide range of topics such as quantum cryptography,
quantum blockchain, post-quantum blockchain, and quantum blockchain
in Industry 4.0, this book also provides the future research
directions of quantum blockchain in terms of quantum resilience,
data management, privacy issues, sustainability, scalability, and
quantum blockchain interoperability. Above all, it explains the
mathematical ideas that underpin the methods of post-quantum
cryptography security. Readers will find in this book a
comprehensiveness of the subject including: The key principles of
quantum computation that solve the factoring issue. A discussion of
a variety of potential post-quantum public-key encryption and
digital signature techniques. Explanations of quantum blockchain in
cybersecurity, healthcare, and Industry 4.0. Audience The book is
for security analysts, data scientists, vulnerability analysts,
professionals, academicians, researchers, industrialists, and
students working in the fields of (quantum) blockchain,
cybersecurity, cryptography, and artificial intelligence with
regard to smart cities and Internet of Things.
Even before the terrorist attacks of September 2001, concerns had
been rising among security experts about the vulnerabilities to
attack of computer systems and associated infrastructure. Yet,
despite increasing attention from federal and state governments and
international organisations, the defence against attacks on these
systems has appeared to be generally fragmented and varying widely
in effectiveness. Concerns have grown that what is needed is a
national cybersecurity framework -- a co-ordinated, coherent set of
public- and private-sector efforts required to ensure an acceptable
level of cybersecurity for the nation. As commonly used,
cybersecurity refers to three things: measures to protect
information technology; the information it contains, processes, and
transmits, and associated physical and virtual elements (which
together comprise cyberspace); the degree of protection resulting
from application of those measures; and the associated field of
professional endeavour. Virtually any element of cyberspace can be
at risk, and the degree of interconnection of those elements can
make it difficult to determine the extent of the cybersecurity
framework that is needed. Identifying the major weaknesses in U.S.
cybersecurity is an area of some controversy. However, some
components appear to be sources of potentially significant risk
because either major vulnerabilities have been identified or
substantial impacts could result from a successful attack -- in
particular, components that play critical roles in elements of
critical infrastructure, widely used commercial software,
organisational governance, and the level of public knowledge and
perception about cybersecurity. There are several options for
broadly addressing weaknesses in cybersecurity. They include
adopting standards and certification, promulgating best practices
and guidelines, using benchmarks and checklists, use of auditing,
improving training and education, building security into enterprise
architecture, using risk management, and using metrics. These
different approaches all have different strengths and weaknesses
with respect to how they might contribute to the development of a
national framework for cybersecurity. None of them are likely to be
widely adopted in the absence of sufficient economic incentives for
cybersecurity.
The term 'spyware' is not well defined. Generally it is used to
refer to any software that is downloaded onto a person's computer
without their knowledge. Spyware may collect information about a
computer user's activities and transmit that information to someone
else. It may change computer settings, or cause 'pop-up'
advertisements to appear (in that context, it is called 'adware').
Spyware may redirect a Web browser to a site different from what
the user intended to visit, or change the user's home page. A type
of spyware called 'keylogging' software records individual
keystrokes, even if the author modifies or deletes what was
written, or if the characters do not appear on the monitor. Thus,
passwords, credit card numbers, and other personally identifiable
information may be captured and relayed to unauthorised recipients.
Some of these software programs have legitimate applications the
computer user wants. They obtain the moniker 'spyware' when they
are installed surreptitiously, or perform additional functions of
which the user is unaware. Users typically do not realise that
spyware is on their computer. They may have unknowingly downloaded
it from the Internet by clicking within a website, or it might have
been included in an attachment to an electronic mail message
(e-mail) or embedded in other software. According to a survey and
tests conducted by America Online and the National Cyber Security
Alliance, 80% of computers in the test group were infected by
spyware or adware, and 89% of the users of those computers were
unaware of it. The Federal Trade Commission (FTC) issued a consumer
alert on spyware in October 2004. It provided a list of warning
signs that might indicate that a computer is infected with spyware,
and advice on what to do if it is. This new book helps shed light
on this insidious nightmare created by members of the human race to
wreck havoc on the remainder.
Since the collapse of the Soviet Union, the United States has faced
the challenge of reorienting its foreign policy to address
post-Cold War conditions. In this new edition of a groundbreaking
work -- one of the first to bring critical theory into dialogue
with more traditional approaches to international relations --
David Campbell provides a fundamental reappraisal of American
foreign policy, with a new epilogue to address current world
affairs and the burgeoning focus on culture and identity in the
study of international relations.
Extending recent debates in international relations, Campbell
shows how perceptions of danger and difference work to establish
the identity of the United States. He demonstrates how foreign
policy, far from being an expression of a given society,
constitutes state identity through the interpretation of danger
posed by others.
SECURITY ISSUES AND PRIVACY CONCERNS IN INDUSTRY 4.0 APPLICATIONS
Written and edited by a team of international experts, this is the
most comprehensive and up-to-date coverage of the security and
privacy issues surrounding Industry 4.0 applications, a must-have
for any library. The scope of Security Issues and Privacy Concerns
in Industry 4.0 Applications is to envision the need for security
in Industry 4.0 applications and the research opportunities for the
future. This book discusses the security issues in Industry 4.0
applications for research development. It will also enable the
reader to develop solutions for the security threats and attacks
that prevail in the industry. The chapters will be framed on par
with advancements in the industry in the area of Industry 4.0 with
its applications in additive manufacturing, cloud computing, IoT
(Internet of Things), and many others. This book helps a researcher
and an industrial specialist to reflect on the latest trends and
the need for technological change in Industry 4.0. Smart water
management using IoT, cloud security issues with network forensics,
regional language recognition for industry 4.0, IoT-based health
care management systems, artificial intelligence for fake profile
detection, and packet drop detection in agriculture-based IoT are
covered in this outstanding new volume. Leading innovations such as
smart drone for railway track cleaning, everyday life-supporting
blockchain and big data, effective prediction using machine
learning, classification of dog breed based on CNN, load balancing
using the SPE approach and cyber culture impact on media consumers
are also addressed. Whether a reference for the veteran engineer or
an introduction to the technologies covered in the book for the
student, this is a must-have for any library.
Strong Pseudorandompermutations or SPRPs,which were introduced
byLuby andRacko? [4], formalize the well established cryptographic
notion ofblock ciphers.They provided a construction of SPRP, well
known as LRconstruction, which was motivated by the structure of
DES[6].The basicbuildingblock is the so called 2n-bit Feistel
permutation (or LR round permutation) LR based F K on an
n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x
,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig
1) offour rounds of Feistel permutations (or three rounds, for
PRP), each round involves an application ofanindependent
PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More
precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K
,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K
,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many
results are known improvingperformance (reducingthe number of
invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K
roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by
usinga PRF[2]). However there are some
limitations.Forexample,wecannotuseas few as single-keyLR (unless
wetweak the roundpermutation) orasfew as two-roundsince they are
not secure. Distinguishing attacks forsome other LR
constructionsarealso known [8]. We list some oftheknow related
results (see Table 1). Here all keys K ,K ,...are independently
chosen.
A comprehensive evaluation of information security analysis
spanning the intersection of cryptanalysis and side-channel
analysis * Written by authors known within the academic
cryptography community, this book presents the latest developments
in current research * Unique in its combination of both
algorithmic-level design and hardware-level implementation; this
all-round approach - algorithm to implementation covers security
from start to completion * Deals with AES (Advanced Encryption
standard), one of the most used symmetric-key ciphers, which helps
the reader to learn the fundamental theory of cryptanalysis and
practical applications of side-channel analysis
The only book to provide a unified view of the interplay between
computational number theory and cryptography Computational number
theory and modern cryptography are two of the most important and
fundamental research fields in information security. In this book,
Song Y. Yang combines knowledge of these two critical fields,
providing a unified view of the relationships between computational
number theory and cryptography. The author takes an innovative
approach, presenting mathematical ideas first, thereupon treating
cryptography as an immediate application of the mathematical
concepts. The book also presents topics from number theory, which
are relevant for applications in public-key cryptography, as well
as modern topics, such as coding and lattice based cryptography for
post-quantum cryptography. The author further covers the current
research and applications for common cryptographic algorithms,
describing the mathematical problems behind these applications in a
manner accessible to computer scientists and engineers. * Makes
mathematical problems accessible to computer scientists and
engineers by showing their immediate application * Presents topics
from number theory relevant for public-key cryptography
applications * Covers modern topics such as coding and lattice
based cryptography for post-quantum cryptography * Starts with the
basics, then goes into applications and areas of active research *
Geared at a global audience; classroom tested in North America,
Europe, and Asia * Incudes exercises in every chapter * Instructor
resources available on the book s Companion Website Computational
Number Theory and Modern Cryptography is ideal for graduate and
advanced undergraduate students in computer science, communications
engineering, cryptography and mathematics. Computer scientists,
practicing cryptographers, and other professionals involved in
various security schemes will also find this book to be a helpful
reference.
Serious Cryptography is the much anticipated review of modern
cryptography by cryptographer JP Aumasson. This is a book for
readers who want to understand how cryptography works in today's
world. The book is suitable for a wide audience, yet is filled with
mathematical concepts and meaty discussions of how the various
cryptographic mechanisms work. Chapters cover the notion of secure
encryption, randomness, block ciphers and ciphers, hash functions
and message authentication codes, public-key crypto including RSA,
Diffie-Hellman, and elliptic curves, as well as TLS and
post-quantum cryptography. Numerous code examples and real use
cases throughout will help practitioners to understand the core
concepts behind modern cryptography, as well as how to choose the
best algorithm or protocol and ask the right questions of vendors.
Aumasson discusses core concepts like computational security and
forward secrecy, as well as strengths and limitations of
cryptographic functionalities related to
Ausgehend von der Theorie und den Protokollen der
Quantenkryptografie werden in dem Band die Servicequalitaten
vorgestellt, die angesichts der aktuellen technischen
Moeglichkeiten erreichbar sind. Unter Berucksichtigung wenig
beachteter Gesichtspunkte der Kryptoanalyse diskutiert der Autor
die erreichbare Sicherheit und untersucht die Moeglichkeiten des
Quantencomputing. Anhand praxisnaher Aufgaben koennen Leser ihr
Wissen vertiefen und lernen, die Techniken kritisch zu bewerten.
Mit Programmieranleitung fur Simulationsversuche auf dem eigenen
Rechner.
Industrial cyber-physical systems operate simultaneously in the
physical and digital worlds of business and are now a cornerstone
of the fourth industrial revolution. Increasingly, these systems
are becoming the way forward for academics and industrialists
alike. The very essence of these systems, however, is often
misunderstood or misinterpreted. This book thus sheds light on the
problem areas surrounding cyber-physical systems and provides the
reader with the key principles for understanding and illustrating
them. Presented using a pedagogical approach, with numerous
examples of applications, this book is the culmination of more than
ten years of study by the Intelligent Manufacturing and Services
Systems (IMS2) French research group, part of the MACS (Modeling,
Analysis and Control of Dynamic Systems) research group at the
CNRS. It is intended both for engineers who are interested in
emerging industrial developments and for master's level students
wishing to learn about the industrial systems of the future.
'The best book on codebreaking I have read', SIR DERMOT TURING
'Brings back the joy I felt when I first read about these things as
a kid', PHIL ZIMMERMANN 'This is at last the single book on
codebreaking that you must have. If you are not yet addicted to
cryptography, this book will get you addicted. Read, enjoy, and
test yourself on history's great still-unbroken messages!' JARED
DIAMOND is the Pulitzer Prize-winning author of Guns, Germs, and
Steel; Collapse; and other international bestsellers 'This is THE
book about codebreaking. Very concise, very inclusive and easy to
read', ED SCHEIDT 'Riveting', MIKE GODWIN 'Approachable and
compelling', GLEN MIRANKER This practical guide to breaking codes
and solving cryptograms by two world experts, Elonka Dunin and
Klaus Schmeh, describes the most common encryption techniques along
with methods to detect and break them. It fills a gap left by
outdated or very basic-level books. This guide also covers many
unsolved messages. The Zodiac Killer sent four encrypted messages
to the police. One was solved; the other three were not. Beatrix
Potter's diary and the Voynich Manuscript were both encrypted - to
date, only one of the two has been deciphered. The breaking of the
so-called Zimmerman Telegram during the First World War changed the
course of history. Several encrypted wartime military messages
remain unsolved to this day. Tens of thousands of other encrypted
messages, ranging from simple notes created by children to
encrypted postcards and diaries in people's attics, are known to
exist. Breaking these cryptograms fascinates people all over the
world, and often gives people insight into the lives of their
ancestors. Geocachers, computer gamers and puzzle fans also require
codebreaking skills. This is a book both for the growing number of
enthusiasts obsessed with real-world mysteries, and also fans of
more challenging puzzle books. Many people are obsessed with trying
to solve famous crypto mysteries, including members of the Kryptos
community (led by Elonka Dunin) trying to solve a decades-old
cryptogram on a sculpture at the centre of CIA Headquarters;
readers of the novels of Dan Brown as well as Elonka Dunin's The
Mammoth Book of Secret Code Puzzles (UK)/The Mammoth Book of Secret
Codes and Cryptograms (US); historians who regularly encounter
encrypted documents; perplexed family members who discover an
encrypted postcard or diary in an ancestor's effects;
law-enforcement agents who are confronted by encrypted messages,
which also happens more often than might be supposed; members of
the American Cryptogram Association (ACA); geocachers (many caches
involve a crypto puzzle); puzzle fans; and computer gamers (many
games feature encryption puzzles). The book's focus is very much on
breaking pencil-and-paper, or manual, encryption methods. Its focus
is also largely on historical encryption. Although manual
encryption has lost much of its importance due to computer
technology, many people are still interested in deciphering
messages of this kind.
|
You may like...
TLS Mastery
Michael W Lucas
Hardcover
R970
R838
Discovery Miles 8 380
|