|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
This book constitutes the thoroughly refereed post-conference
proceedings of the 13th International Conference on Information
Security and Cryptology, held in Seoul, Korea, in December 2010.
The 28 revised full papers presented were carefully selected from
99 submissions during two rounds of reviewing. The conference
provides a forum for the presentation of new results in research,
development, and applications in the field of information security
and cryptology. The papers are organized in topical sections on
cryptanalysis, cryptographic algorithms, implementation, network
and mobile security, symmetric key cryptography, cryptographic
protocols, and side channel attack.
Strong Pseudorandompermutations or SPRPs,which were introduced
byLuby andRacko? [4], formalize the well established cryptographic
notion ofblock ciphers.They provided a construction of SPRP, well
known as LRconstruction, which was motivated by the structure of
DES[6].The basicbuildingblock is the so called 2n-bit Feistel
permutation (or LR round permutation) LR based F K on an
n-bitpseudorandomfunction (PRF) F : K n LR (x ,x)=(F (x )?x ,x ),x
,x?{0,1} . F 1 2 K 1 2 1 1 2 K Theirconstruction consists (see Fig
1) offour rounds of Feistel permutations (or three rounds, for
PRP), each round involves an application ofanindependent
PRF(i.e.with independentrandomkeys K ,K ,K , and K ). More
precisely, 1 2 3 4 LR and LR are PRP and SPRP respectively where K
,K ,K K ,K ,K ,K 1 2 3 1 2 3 4 LR := LR := LR (...(LR (*))...). K
,...,K F ,...,F F F 1 r K K K K r r 1 1 After this work, many
results are known improvingperformance (reducingthe number of
invocations of F )[5] and reducingthekey-sizes (i.e. reusingthe K
roundkeys [7,8,10,12,11] orgenerate more keysfromsinglekey by
usinga PRF[2]). However there are some
limitations.Forexample,wecannotuseas few as single-keyLR (unless
wetweak the roundpermutation) orasfew as two-roundsince they are
not secure. Distinguishing attacks forsome other LR
constructionsarealso known [8]. We list some oftheknow related
results (see Table 1). Here all keys K ,K ,...are independently
chosen.
An authoritative and comprehensive guide to the Rijndael algorithm
and Advanced Encryption Standard (AES). AES is expected to
gradually replace the present Data Encryption Standard (DES) as the
most widely applied data encryption technology. This book, written
by the designers of the block cipher, presents Rijndael from
scratch. The underlying mathematics and the wide trail strategy as
the basic design idea are explained in detail and the basics of
differential and linear cryptanalysis are reworked. Subsequent
chapters review all known attacks against the Rijndael structure
and deal with implementation and optimization issues. Finally,
other ciphers related to Rijndael are presented.
|
TLS Mastery
(Hardcover)
Michael W Lucas
|
R1,021
R867
Discovery Miles 8 670
Save R154 (15%)
|
Ships in 10 - 15 working days
|
|
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
The fastest-growing malware in the world The core functionality of
ransomware is two-fold: to encrypt data and deliver the ransom
message. This encryption can be relatively basic or maddeningly
complex, and it might affect only a single device or a whole
network. Ransomware is the fastest-growing malware in the world. In
2015, it cost companies around the world $325 million, which rose
to $5 billion by 2017 and is set to hit $20 billion in 2021. The
threat of ransomware is not going to disappear, and while the
number of ransomware attacks remains steady, the damage they cause
is significantly increasing. It is the duty of all business leaders
to protect their organisations and the data they rely on by doing
whatever is reasonably possible to mitigate the risk posed by
ransomware. To do that, though, they first need to understand the
threats they are facing. The Ransomware Threat Landscape This book
sets out clearly how ransomware works, to help business leaders
better understand the strategic risks, and explores measures that
can be put in place to protect the organisation. These measures are
structured so that any organisation can approach them. Those with
more resources and more complex environments can build them into a
comprehensive system to minimise risks, while smaller organisations
can secure their profiles with simpler, more straightforward
implementation. Suitable for senior directors, compliance managers,
privacy managers, privacy officers, IT staff, security analysts and
admin staff - in fact, all staff who use their organisation's
network/online systems to perform their role - The Ransomware
Threat Landscape - Prepare for, recognise and survive ransomware
attacks will help readers understand the ransomware threat they
face. From basic cyber hygiene to more advanced controls, the book
gives practical guidance on individual activities, introduces
implementation steps organisations can take to increase their cyber
resilience, and explores why cyber security is imperative. Topics
covered include: Introduction About ransomware Basic measures An
anti-ransomware The control framework Risk management Controls
Maturity Basic controls Additional controls for larger
organisations Advanced controls Don't delay - start protecting your
organisation from ransomware and buy this book today!
Quantum cryptography (or quantum key distribution) is a
state-of-the-art technique that exploits properties of quantum
mechanics to guarantee the secure exchange of secret keys. This
self-contained text introduces the principles and techniques of
quantum cryptography, setting it in the wider context of
cryptography and security, with specific focus on secret-key
distillation. The book starts with an overview chapter, progressing
to classical cryptography, information theory (classical and
quantum), and applications of quantum cryptography. The discussion
moves to secret-key distillation, privacy amplification and
reconciliation techniques, concluding with the security principles
of quantum cryptography. The author explains the physical
implementation and security of these systems, enabling engineers to
gauge the suitability of quantum cryptography for securing
transmission in their particular application. With its blend of
fundamental theory, implementation techniques, and details of
recent protocols, this book will be of interest to graduate
students, researchers, and practitioners in electrical engineering,
physics, and computer science.
Digital transformation is a revolutionary technology that will play
a vital role in major industries, including global governments.
These administrations are taking the initiative to incorporate
digital programs with their objective being to provide digital
infrastructure as a basic utility for every citizen, provide on
demand services with superior governance, and empower their
citizens digitally. However, security and privacy are major
barriers in adopting these mechanisms, as organizations and
individuals are concerned about their private and financial data.
Impact of Digital Transformation on Security Policies and Standards
is an essential research book that examines the policies,
standards, and mechanisms for security in all types of digital
applications and focuses on blockchain and its imminent impact on
financial services in supporting smart government, along with
bitcoin and the future of digital payments. Highlighting topics
such as cryptography, privacy management, and e-government, this
book is ideal for security analysts, data scientists, academicians,
policymakers, security professionals, IT professionals, government
officials, finance professionals, researchers, and students.
|
|