Mostrando 1 - 6 Resultados de 6 Para Buscar '"International Data Encryption Algorithm"', tiempo de consulta: 0.09s Limitar resultados
  1. 1
    por Dube, Roger
    Publicado 2008
    Tabla de Contenidos: “…Symmetric Key CryptographyOne-Time Pad; DES and Triple DES; International Data-Encryption Algorithm; Rivest Cipher 4; Blowfish; Advanced Encryption Standard; Quantum Cryptography; Hash Algorithms; The Birthday Paradox and Hash Algorithms; References; 3 KEY GENERATION AND DISTRIBUTION APPROACHES AND ATTACKS; Key Generation; Software Key Generation; Hardware Key Generation; Noise-Based Approaches; Noisy Diodes and Resistors; Radio-Frequency Sources; Brownian-Motion Devices; Quantum Devices; Nuclear Decay Devices; Optical Devices; Other Hardware Sources of Randomness; Key Distribution…”
    Libro electrónico
  2. 2
    Publicado 2014
    Tabla de Contenidos: “…Cover; Title Page; Copyright; Contents; Foreword; Introduction; Assessment Test; Chapter 1 Cryptographic Tools and Techniques; The History of Cryptography; Cryptographic Services; Cryptographic Goals; Cryptographic Terms; Cipher Types and Methods; Symmetric Encryption; Data Encryption Standard; Triple DES; Advanced Encryption Standard; International Data Encryption Algorithm; Rivest Cipher Algorithms; Asymmetric Encryption; Diffie-Hellman; RSA; Elliptic Curve Cryptography; ElGamal; Hybrid Encryption; Hashing; Hashing and Message Digests; MD Series; SHA; HAVAL; Message Authentication Code…”
    Libro electrónico
  3. 3
    por Ajay, Kumar
    Publicado 2016
    Tabla de Contenidos: “…3.3.2 Column Transposition -- 3.4 Steganography -- 3.4.1 Modern Steganography Techniques -- 3.4.2 Attacks on Steganography -- 3.4.3 Applications -- 3.5 Linear Feedback Shift Registers -- 3.5.1 Linear Recurrence Relation -- 3.5.2 LFSR Operation -- Key Terms -- Summary -- Review Questions -- CHAPTER 4 Data Encryption Standard -- 4.1 Simplified Data Encryption Standard -- 4.1.1 S-DES Encryption -- 4.1.2 Key Expansion Process -- 4.1.3 S-DES Decryption -- 4.2 Data Encryption Standard -- 4.2.1 DES Encryption and Decryption -- 4.2.2 DES Key Expansion -- 4.2.3 DES Decryption -- 4.3 Strength of DES -- 4.3.1 Brute-force Attack -- 4.3.2 Differential Cryptanalysis -- 4.3.3 Linear Cryptanalysis -- 4.4 Modes of Operation -- 4.4.1 Electronic Code Book Mode -- 4.4.2 Cipher Block Chaining Mode -- 4.4.3 Cipher Feedback Mode -- 4.4.4 Output Feedback Mode -- 4.4.5 Counter Mode -- Key Terms -- Summary -- Review Questions -- References -- CHAPTER 5 Secure Block Cipher and Stream Cipher Technique -- 5.1 Need for Double DES and Triple DES -- 5.2 Double DES -- 5.2.1 Meet-in-the-Middle Attack -- 5.2.2 Attacking Scenario -- 5.3 Triple DES -- 5.4 Pseudo Random Number Generator -- 5.4.1 Linear Congruential Generator -- 5.4.2 Blum Blum Shub Generator -- 5.5 RC4 -- 5.5.1 Principle of RC4 -- 5.5.2 The Key-scheduling Algorithm -- 5.5.3 The Pseudo Random Generation Algorithm -- 5.5.4 Encryption and Decryption -- 5.6 RC5 -- 5.6.1 Principles of RC5 -- 5.6.2 RC5 Key Expansion -- 5.6.3 RC5 Encryption -- 5.6.4 RC5 Decryption -- 5.7 International Data Encryption Algorithm -- 5.7.1 Principles of IDEA -- 5.7.2 Key Expansion -- 5.7.3 IDEA Encryption and Decryption -- 5.8 Blowfish Encryption -- 5.8.1 Principles of Blowfish -- 5.8.2 Key Expansion -- 5.8.3 Encryption and Decryption -- 5.9 CAST-128 -- 5.9.1 CAST-128 Algorithm -- 5.9.2 Strength of CAST -- 5.10 RC2 -- 5.10.1 Key Expansion Process…”
    Libro electrónico
  4. 4
    Publicado 2013
    Tabla de Contenidos: “…-- Preface xiii -- About the Author xxi -- Acknowledgments xxiii -- 1 Internetworking and Layered Models 1 -- 1.1 Networking Technology 2 -- 1.2 Connecting Devices 5 -- 1.3 The OSI Model 8 -- 1.4 TCP/IP Model 12 -- 2 TCP/IP Suite and Internet Stack Protocols 15 -- 2.1 Network Layer Protocols 15 -- 2.2 Transport Layer Protocols 41 -- 2.3 World Wide Web 47 -- 2.4 File Transfer 49 -- 2.5 E-Mail 50 -- 2.6 Network Management Service 52 -- 2.7 Converting IP Addresses 53 -- 2.8 Routing Protocols 54 -- 2.9 Remote System Programs 55 -- 2.10 Social Networking Services 56 -- 2.11 Smart IT Devices 57 -- 2.12 Network Security Threats 58 -- 2.13 Internet Security Threats 58 -- 2.14 Computer Security Threats 59 -- 3 Global Trend of Mobile Wireless Technology 63 -- 3.1 1G Cellular Technology 63 -- 3.2 2G Mobile Radio Technology 64 -- 3.3 2.5G Mobile Radio Technology 67 -- 3.4 3G Mobile Radio Technology (Situation and Status of 3G) 70 -- 3.5 3G UMTS Security-Related Encryption Algorithm 75 -- 4 Symmetric Block Ciphers 81 -- 4.1 Data Encryption Standard (DES) 81 -- 4.2 International Data Encryption Algorithm (IDEA) 99 -- 4.3 RC5 Algorithm 108 -- 4.4 RC6 Algorithm 123 -- 4.5 AES (Rijndael) Algorithm 135 -- 5 Hash Function, Message Digest, and Message Authentication Code 161 -- 5.1 DMDC Algorithm 161 -- 5.2 Advanced DMDC Algorithm 171 -- 5.3 MD5 Message-Digest Algorithm 176 -- 5.4 Secure Hash Algorithm (SHA-1) 188 -- 5.5 Hashed Message Authentication Codes (HMAC) 195 -- 6 Asymmetric Public-Key Cryptosystems 203 -- 6.1 Diffie / Hellman Exponential Key Exchange 203 -- 6.2 RSA Public-Key Cryptosystem 207 -- 6.3 ElGamal's Public-Key Cryptosystem 215 -- 6.4 Schnorr's Public-Key Cryptosystem 222 -- 6.5 Digital Signature Algorithm 227 -- 6.6 The Elliptic Curve Cryptosystem (ECC) 230 -- 7 Public-Key Infrastructure 249 -- 7.1 Internet Publications for Standards 250 -- 7.2 Digital Signing Techniques 251 -- 7.3 Functional Roles of PKI Entities 258 -- 7.4 Key Elements for PKI Operations 263 -- 7.5 X.509 Certificate Formats 271.…”
    Libro electrónico
  5. 5
    Publicado 2024
    Tabla de Contenidos: “…Import/Export -- Privacy -- State Privacy Laws -- Compliance -- Contracting and Procurement -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 5 Protecting Security of Assets -- Identifying and Classifying Information and Assets -- Defining Sensitive Data -- Defining Data Classifications -- Defining Asset Classifications -- Understanding Data States -- Determining Compliance Requirements -- Determining Data Security Controls -- Establishing Information and Asset Handling Requirements -- Data Maintenance -- Data Loss Prevention -- Labeling Sensitive Data and Assets -- Handling Sensitive Information and Assets -- Data Collection Limitation -- Data Location -- Storing Sensitive Data -- Data Destruction -- Ensuring Appropriate Data and Asset Retention -- Data Protection Methods -- Digital Rights Management -- Cloud Access Security Broker -- Pseudonymization -- Tokenization -- Anonymization -- Understanding Data Roles -- Data Owners -- Data Controllers and Processors -- Data Custodians -- Users and Subjects -- Using Security Baselines -- Comparing Tailoring and Scoping -- Standards Selection -- Summary -- Study Essentials -- Written Lab -- Review Questions -- Chapter 6 Cryptography and Symmetric Key Algorithms -- Cryptographic Foundations -- Goals of Cryptography -- Cryptography Concepts -- Cryptographic Mathematics -- Ciphers -- Modern Cryptography -- Cryptographic Keys -- Symmetric Key Algorithms -- Asymmetric Key Algorithms -- Hashing Algorithms -- Symmetric Cryptography -- Block Cipher Modes of Operation -- Data Encryption Standard -- Triple DES -- International Data Encryption Algorithm -- Blowfish -- SKIPJACK -- Rivest Ciphers -- Advanced Encryption Standard -- CAST -- Comparison of Symmetric Encryption Algorithms -- Symmetric Key Management -- Cryptographic Life Cycle -- Summary -- Study Essentials -- Written Lab…”
    Libro electrónico
  6. 6
    Publicado 2023
    Tabla de Contenidos: “…Virtualization -- Serverless -- High-Performance Computing (HPC) and Grid Computing -- Peer-to-Peer -- Thin Clients -- Diskless Workstations -- Thin Client Applications -- Embedded Systems and The Internet of Things (IoT) -- Distributed Systems and Edge Computing Systems -- Industrial Control Systems (ICS) -- System Vulnerabilities, Threats, and Countermeasures -- Emanations -- Covert Channels -- Covert Storage Channels -- Covert Timing Channels -- Backdoors -- Malicious Code (Malware) -- Computer Viruses -- Worms -- Trojans -- Rootkits -- Packers -- Logic Bombs -- Antivirus Software -- Server-Side Attacks -- Client-Side Attacks -- Web Architecture and Attacks -- Applets -- Java -- ActiveX -- OWASP -- XML -- Service Oriented Architecture (SOA) -- Database Security -- Polyinstantiation -- Inference and Aggregation -- Inference and Aggregation Controls -- Data Mining -- Data Analytics -- Countermeasures -- Mobile Device Attacks -- Mobile Device Defenses -- Cornerstone Cryptographic Concepts -- Key Terms -- Confidentiality, Integrity, Authentication, and Non-repudiation -- Confusion, Diffusion, Substitution, and Permutation -- Cryptographic Strength -- Monoalphabetic and Polyalphabetic Ciphers -- Modular Math -- Exclusive Or (XOR) -- Data at Rest and Data in Motion -- Protocol Governance -- Types of Cryptography -- Symmetric Encryption -- Stream and Block Ciphers -- Initialization Vectors and Chaining -- DES -- Modes of DES -- Electronic Code Book (ECB) -- Cipher Block Chaining (CBC) -- Cipher Feedback (CFB) -- Output Feedback (OFB) -- Counter Mode (CTR) -- Single DES -- Triple DES -- International Data Encryption Algorithm (IDEA) -- Advanced Encryption Standard (AES) -- Choosing AES…”
    Libro electrónico