|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
Blockchain technology has the potential to utterly transform supply
chains, streamline processes, and improve the whole of security.
Manufacturers across the globe face challenges with forecasting
demand, controlling inventory, and accelerating digital
transformation to cater to the challenges of changing market
dynamics and evolving customer expectations. Hence, blockchain
should be seen as an investment in future-readiness and
customer-centricity, not as an experimental technology. Utilizing
Blockchain Technologies in Manufacturing and Logistics Management
explores the strengths of blockchain adaptation in manufacturing
industries and logistics management, which include product
traceability, supply chain transparency, compliance monitoring, and
auditability, and also examines the current open issues and future
research trends of blockchain. Leveraging blockchain technology
into a manufacturing enterprise can enhance its security and reduce
the rates of systematic failures. Covering topics such as fraud
detection, Industry 4.0, and security threats, this book is a ready
premier reference for graduate and post-graduate students,
academicians, researchers, industrialists, consultants, and
entrepreneurs, as well as micro, small, and medium enterprises.
This book summarizes recent inventions, provides guidelines and
recommendations, and demonstrates many practical applications of
homomorphic encryption. This collection of papers represents the
combined wisdom of the community of leading experts on Homomorphic
Encryption. In the past 3 years, a global community consisting of
researchers in academia, industry, and government, has been working
closely to standardize homomorphic encryption. This is the first
publication of whitepapers created by these experts that
comprehensively describes the scientific inventions, presents a
concrete security analysis, and broadly discusses applicable use
scenarios and markets. This book also features a collection of
privacy-preserving machine learning applications powered by
homomorphic encryption designed by groups of top graduate students
worldwide at the Private AI Bootcamp hosted by Microsoft Research.
The volume aims to connect non-expert readers with this important
new cryptographic technology in an accessible and actionable way.
Readers who have heard good things about homomorphic encryption but
are not familiar with the details will find this book full of
inspiration. Readers who have preconceived biases based on
out-of-date knowledge will see the recent progress made by
industrial and academic pioneers on optimizing and standardizing
this technology. A clear picture of how homomorphic encryption
works, how to use it to solve real-world problems, and how to
efficiently strengthen privacy protection, will naturally become
clear.
This book provides an opportunity for investigators, government
officials, systems scientists, strategists, assurance researchers,
owners, operators and maintainers of large, complex and advanced
systems and infrastructures to update their knowledge with the
state of best practice in the challenging domains whilst networking
with the leading representatives, researchers and solution
providers. Drawing on 12 years of successful events on information
security, digital forensics and cyber-crime, the 13th ICGS3-20
conference aims to provide attendees with an information-packed
agenda with representatives from across the industry and the globe.
The challenges of complexity, rapid pace of change and
risk/opportunity issues associated with modern products, systems,
special events and infrastructures. In an era of unprecedented
volatile, political and economic environment across the world,
computer-based systems face ever more increasing challenges,
disputes and responsibilities, and whilst the Internet has created
a global platform for the exchange of ideas, goods and services, it
has also created boundless opportunities for cyber-crime. As an
increasing number of large organizations and individuals use the
Internet and its satellite mobile technologies, they are
increasingly vulnerable to cyber-crime threats. It is therefore
paramount that the security industry raises its game to combat
these threats. Whilst there is a huge adoption of technology and
smart home devices, comparably, there is a rise of threat vector in
the abuse of the technology in domestic violence inflicted through
IoT too. All these are an issue of global importance as law
enforcement agencies all over the world are struggling to cope.
Cryptology is increasingly becoming one of the most essential
topics of interest in everyday life. Digital communication happens
by transferring data between at least two participants - But do we
want to disclose private information while executing a sensitive
bank transfer? How about allowing third-party entities to eavesdrop
on private calls while performing an important secret business
discussion? Do we want to allow ambient communication concerning us
to be manipulated while control software is driving our autonomous
car along a steep slope? Questions like these make it clear why
issues of security are a great concern in our increasingly
augmented world.Cryptology for Engineers is a study of digital
security in communications systems. The book covers the
cryptographical functionalities of ciphering, hash generation,
digital signature generation, key management and random number
generation, with a clear sense of the mathematical background on
the one hand and engineers' requirements on the other. Numerous
examples computable by hand or with a small additional cost in most
cases are provided inside.
This book presents a complete and accurate study of arithmetic and
algebraic circuits. The first part offers a review of all important
basic concepts: it describes simple circuits for the implementation
of some basic arithmetic operations; it introduces theoretical
basis for residue number systems; and describes some fundamental
circuits for implementing the main modular operations that will be
used in the text. Moreover, the book discusses floating-point
representation of real numbers and the IEEE 754 standard. The
second and core part of the book offers a deep study of arithmetic
circuits and specific algorithms for their implementation. It
covers the CORDIC algorithm, and optimized arithmetic circuits
recently developed by the authors for adders and subtractors, as
well as multipliers, dividers and special functions. It describes
the implementation of basic algebraic circuits, such as LFSRs and
cellular automata. Finally, it offers a complete study of Galois
fields, showing some exemplary applications and discussing the
advantages in comparison to other methods. This dense,
self-contained text provides students, researchers and engineers,
with extensive knowledge on and a deep understanding of arithmetic
and algebraic circuits and their implementation.
This book explores the genesis of ransomware and how the parallel
emergence of encryption technologies has elevated ransomware to
become the most prodigious cyber threat that enterprises are
confronting. It also investigates the driving forces behind what
has been dubbed the 'ransomware revolution' after a series of major
attacks beginning in 2013, and how the advent of cryptocurrencies
provided the catalyst for the development and increased
profitability of ransomware, sparking a phenomenal rise in the
number and complexity of ransomware attacks. This book analyzes why
the speed of technology adoption has been a fundamental factor in
the continued success of financially motivated cybercrime, and how
the ease of public access to advanced encryption techniques has
allowed malicious actors to continue to operate with increased
anonymity across the internet. This anonymity has enabled increased
collaboration between attackers, which has aided the development of
new ransomware attacks, and led to an increasing level of technical
complexity in ransomware attacks. This book highlights that the
continuous expansion and early adoption of emerging technologies
may be beyond the capacity of conventional risk managers and risk
management frameworks. Researchers and advanced level students
studying or working in computer science, business or criminology
will find this book useful as a reference or secondary text.
Professionals working in cybersecurity, cryptography, information
technology, financial crime (and other related topics) will also
welcome this book as a reference.
This monograph describes and implements partially homomorphic
encryption functions using a unified notation. After introducing
the appropriate mathematical background, the authors offer a
systematic examination of the following known algorithms:
Rivest-Shamir-Adleman; Goldwasser-Micali; ElGamal; Benaloh;
Naccache-Stern; Okamoto-Uchiyama; Paillier; Damgaard-Jurik;
Boneh-Goh-Nissim; and Sander-Young-Yung. Over recent years
partially and fully homomorphic encryption algorithms have been
proposed and researchers have addressed issues related to their
formulation, arithmetic, efficiency and security. Formidable
efficiency barriers remain, but we now have a variety of algorithms
that can be applied to various private computation problems in
healthcare, finance and national security, and studying these
functions may help us to understand the difficulties ahead. The
book is valuable for researchers and graduate students in Computer
Science, Engineering, and Mathematics who are engaged with
Cryptology.
This book constitutes the thoroughly refereed post-conference
proceedings of the IFIP WG 11.4 International Workshop on Open
Problems in Network Security, iNetSec 2011, held in Lucerne,
Switzerland, in June 2011, co-located and under the auspices of
IFIP SEC 2011, the 26th IFIP TC-11 International Information
Security Conference. The 12 revised full papers were carefully
reviewed and selected from 28 initial submissions; they are fully
revised to incorporate reviewers' comments and discussions at the
workshop. The volume is organized in topical sections on assisting
users, malware detection, saving energy, policies, and problems in
the cloud.
This book constitutes the thoroughly refereed post-conference
proceedings of the 13th International Conference on Information
Security and Cryptology, held in Seoul, Korea, in December 2010.
The 28 revised full papers presented were carefully selected from
99 submissions during two rounds of reviewing. The conference
provides a forum for the presentation of new results in research,
development, and applications in the field of information security
and cryptology. The papers are organized in topical sections on
cryptanalysis, cryptographic algorithms, implementation, network
and mobile security, symmetric key cryptography, cryptographic
protocols, and side channel attack.
Strong Pseudorandompermutations or SPRPs,which were introduced
byLuby andRacko? [4], formalize the well established cryptographic
notion ofblock ciphers.They provided a construction of SPRP, well
known as LRconstruction, which was motivated by the structure of
DES[6].The basicbuildingblock is the so called 2n-bit Feistel
permutation (or LR round permutation) LR based F K on an
n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x
,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig
1) offour rounds of Feistel permutations (or three rounds, for
PRP), each round involves an application ofanindependent
PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More
precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K
,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K
,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many
results are known improvingperformance (reducingthe number of
invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K
roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by
usinga PRF[2]). However there are some
limitations.Forexample,wecannotuseas few as single-keyLR (unless
wetweak the roundpermutation) orasfew as two-roundsince they are
not secure. Distinguishing attacks forsome other LR
constructionsarealso known [8]. We list some oftheknow related
results (see Table 1). Here all keys K ,K ,...are independently
chosen.
An authoritative and comprehensive guide to the Rijndael algorithm
and Advanced Encryption Standard (AES). AES is expected to
gradually replace the present Data Encryption Standard (DES) as the
most widely applied data encryption technology. This book, written
by the designers of the block cipher, presents Rijndael from
scratch. The underlying mathematics and the wide trail strategy as
the basic design idea are explained in detail and the basics of
differential and linear cryptanalysis are reworked. Subsequent
chapters review all known attacks against the Rijndael structure
and deal with implementation and optimization issues. Finally,
other ciphers related to Rijndael are presented.
|
|