|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Cryptology is the practice of hiding digital information by means
of various obfuscatory and steganographic techniques. The
application of said techniques facilitates message confidentiality
and sender/receiver identity authentication, and helps to ensure
the integrity and security of computer passwords, ATM card
information, digital signatures, DVD and HDDVD content, and
electronic commerce. Cryptography is also central to digital rights
management (DRM), a group of techniques for technologically
controlling the use of copyrighted material that is being widely
implemented and deployed at the behest of corporations that own and
create revenue from the hundreds of thousands of mini-transactions
that take place daily on programs like iTunes.
This new edition of our best-selling book on cryptography and
information hiding delineates a number of different methods to hide
information in all types of digital media files. These methods
include encryption, compression, data embedding and watermarking,
data mimicry, and scrambling. During the last 5 years, the
continued advancement and exponential increase of computer
processing power have enhanced the efficacy and scope of electronic
espionage and content appropriation. Therefore, this edition has
amended and expanded outdated sections in accordance with new
dangers, and includes 5 completely new chapters that introduce
newer more sophisticated and refined cryptographic algorithms and
techniques (such as fingerprinting, synchronization, and
quantization) capable of withstanding the evolved forms of attack.
Each chapter is divided into sections, first providing an
introduction and high-level summary for those who wish to
understand theconcepts without wading through technical
explanations, and then presenting concrete examples and greater
detail for those who want to write their own programs. This
combination of practicality and theory allows programmers and
system designers to not only implement tried and true encryption
procedures, but also consider probable future developments in their
designs, thus fulfilling the need for preemptive caution that is
becoming ever more explicit as the transference of digital media
escalates.
* Includes 5 completely new chapters that delineate the most
current and sophisticated cryptographic algorithms, allowing
readers to protect their information against even the most evolved
electronic attacks.
* Conceptual tutelage in conjunction with detailed mathematical
directives allows the reader to not only understand encryption
procedures, but also to write programs which anticipate future
security developments in their design.
* Grants the reader access to online source code which can be used
to directly implement proven cryptographic procedures such as data
mimicry and reversible grammar generation into their own work.
Information Security is usually achieved through a mix of
technical, organizational and legal measures. These may include the
application of cryptography, the hierarchical modeling of
organizations in order to assure confidentiality, or the
distribution of accountability and responsibility by law, among
interested parties.
The history of Information Security reaches back to ancient times
and starts with the emergence of bureaucracy in administration and
warfare. Some aspects, such as the interception of encrypted
messages during World War II, have attracted huge attention,
whereas other aspects have remained largely uncovered.
There has never been any effort to write a comprehensive history.
This is most unfortunate, because Information Security should be
perceived as a set of communicating vessels, where technical
innovations can make existing legal or organisational frame-works
obsolete and a breakdown of political authority may cause an
exclusive reliance on technical means.
This book is intended as a first field-survey. It consists of
twenty-eight contributions, written by experts in such diverse
fields as computer science, law, or history and political science,
dealing with episodes, organisations and technical developments
that may considered to be exemplary or have played a key role in
the development of this field.
These include: the emergence of cryptology as a discipline during
the Renaissance, the Black Chambers in 18th century Europe, the
breaking of German military codes during World War II, the
histories of the NSA and its Soviet counterparts and contemporary
cryptology. Other subjects are: computer security standards,
viruses and worms on the Internet, computer transparency and free
software, computer crime, export regulations for encryption
software and the privacy debate.
- Interdisciplinary coverage of the history Information
Security
- Written by top experts in law, history, computer and information
science
- First comprehensive work in Information Security
Chipless RFID based on RF Encoding Particle: Realization, Coding
and Reading System explores the field of chipless identification
based on the RF Encoding Particle (REP). The book covers the
possibility of collecting information remotely with RF waves (RFID)
with totally passive tags without wire, batteries, and chips, and
even printed on paper. Despite the many benefits of RFID,
deployment is still hindered by several economic and technological
factors. Among these barriers are the high cost of tags, lack of
reliability and security in the information contained in the RFID
chip, and how tags are 'recycled.' This book focuses on the
development of chipless RFID tags, representing a new family of low
cost tags. With this technology information is extracted from the
electromagnetic response of the tag, which depends only on its
geometry. Various solutions have been developed by the authors to
increase the amount of information, reduce the surface of the tag,
or improve the robustness of detection. Considerations such as
realization using paper substrate, the development of a low cost
detection system, and measurements in a real environment have been
addressed for practical implementation.
Eleventh Hour CISSP: Study Guide, Third Edition provides readers
with a study guide on the most current version of the Certified
Information Systems Security Professional exam. This book is
streamlined to include only core certification information, and is
presented for ease of last-minute studying. Main objectives of the
exam are covered concisely with key concepts highlighted. The CISSP
certification is the most prestigious, globally-recognized, vendor
neutral exam for information security professionals. Over 100,000
professionals are certified worldwide, with many more joining their
ranks. This new third edition is aligned to cover all of the
material in the most current version of the exam's Common Body of
Knowledge. All domains are covered as completely and concisely as
possible, giving users the best possible chance of acing the exam.
"Cryptographic Protocol: Security Analysis Based on Trusted
Freshness" mainly discusses how to analyze and design cryptographic
protocols based on the idea of system engineering and that of the
trusted freshness component. A novel freshness principle based on
the trusted freshness component is presented; this principle is the
basis for an efficient and easy method for analyzing the security
of cryptographic protocols. The reasoning results of the new
approach, when compared with the security conditions, can either
establish the correctness of a cryptographic protocol when the
protocol is in fact correct, or identify the absence of the
security properties, which leads the structure to construct attacks
directly. Furthermore, based on the freshness principle, a belief
multiset formalism is presented. This formalism s efficiency,
rigorousness, and the possibility of its automation are also
presented.
The book is intended for researchers, engineers, and graduate
students in the fields of communication, computer science and
cryptography, and will be especially useful for engineers who need
to analyze cryptographic protocols in the real world.
Dr. Ling Dong is a senior engineer in the network construction and
information security field. Dr. Kefei Chen is a Professor at the
Department of Computer Science and Engineering, Shanghai Jiao Tong
University.
Encryption protects information stored on smartphones, laptops, and
other devices - in some cases by default. Encrypted communications
are provided by widely used computing devices and services - such
as smartphones, laptops, and messaging applications - that are used
by hundreds of millions of users. Individuals, organizations, and
governments rely on encryption to counter threats from a wide range
of actors, including unsophisticated and sophisticated criminals,
foreign intelligence agencies, and repressive governments.
Encryption on its own does not solve the challenge of providing
effective security for data and systems, but it is an important
tool. At the same time, encryption is relied on by criminals to
avoid investigation and prosecution, including criminals who may
unknowingly benefit from default settings as well as those who
deliberately use encryption. Thus, encryption complicates law
enforcement and intelligence investigations. When communications
are encrypted "end-to-end," intercepted messages cannot be
understood. When a smartphone is locked and encrypted, the contents
cannot be read if the phone is seized by investigators. Decrypting
the Encryption Debate reviews how encryption is used, including its
applications to cybersecurity; its role in protecting privacy and
civil liberties; the needs of law enforcement and the intelligence
community for information; technical and policy options for
accessing plaintext; and the international landscape. This book
describes the context in which decisions about providing authorized
government agencies access to the plaintext version of encrypted
information would be made and identifies and characterizes possible
mechanisms and alternative means of obtaining information. Table of
Contents Front Matter Summary 1 Introduction 2 Encryption and Its
Applications 3 The Role of Encryption in Protecting Privacy and
Civil Liberties 4 Information Needs of Law Enforcement and the
Intelligence Community 5 Options for Accessing Plaintext 6
International Dimensions 7 A Framework for Evaluating Approaches to
Access Plaintext Appendix A Biographies of Committee Members
Appendix B Briefers to the Committee
This book presents a complete and accurate study of arithmetic and
algebraic circuits. The first part offers a review of all important
basic concepts: it describes simple circuits for the implementation
of some basic arithmetic operations; it introduces theoretical
basis for residue number systems; and describes some fundamental
circuits for implementing the main modular operations that will be
used in the text. Moreover, the book discusses floating-point
representation of real numbers and the IEEE 754 standard. The
second and core part of the book offers a deep study of arithmetic
circuits and specific algorithms for their implementation. It
covers the CORDIC algorithm, and optimized arithmetic circuits
recently developed by the authors for adders and subtractors, as
well as multipliers, dividers and special functions. It describes
the implementation of basic algebraic circuits, such as LFSRs and
cellular automata. Finally, it offers a complete study of Galois
fields, showing some exemplary applications and discussing the
advantages in comparison to other methods. This dense,
self-contained text provides students, researchers and engineers,
with extensive knowledge on and a deep understanding of arithmetic
and algebraic circuits and their implementation.
|
You may like...
Database Security
Melissa Zgola, Alfred Basta
Paperback
R1,158
R1,038
Discovery Miles 10 380
|