Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Sean-Philip Oriyano
Cryptography InfoSec Pro Guide
About the Author
Copyright Page
Contents
Acknowledgments
Introduction
Chapter 1: The Language of Cryptography
Fundamentals of Cryptography
Things to Know Upfront About Encryption
The Process of Encryption: A Closer Look
Encryption
Plaintext
Ciphertext
Algorithms and Ciphers
Keys
Putting It All Together
We’ve Covered
Chapter 2: History of Cryptography
Cryptography Overview
What Is Cryptography?
History of Cryptography
Modern Cryptography
We’ve Covered
Chapter 3: Components of Cryptography
Cryptography: Taking a Look Back and Looking Forward
Encryption
Visiting an Old Friend
Dissecting the Caesar Cipher
We’ve Covered
Chapter 4: Algorithms and Ciphers
A High-Level Look at Algorithms
Symmetric Algorithms
Common Symmetric Algorithms
So What’s the Key?
Don’t Forget Your Key
Don’t Cross the Streams, You Block… Head
One-Time Pad
Which Is Better, Getting Hit with a Block or Drowning in a Stream?
Asymmetric/Public-Key Cryptography
We’ve Covered
Chapter 5: Hashing and Message Digests
Fundamentals of Hashing
A Closer Look
Hashing Algorithms
Applications of Hashing
Breaking Hashes and “Kicking Hash”
Lookup Tables
Rainbow Tables
Adding a Pinch of Salt
We’ve Covered
Chapter 6: Cryptanalysis and Code Breaking
Setting Things Straight
A Look at Cryptanalysis and Code Breaking
How it Works, Breaking the Codes
The Basics
We’ve Covered
Chapter 7: Public Key Infrastructure
So What Is PKI?
Symmetric Encryption
Asymmetric Encryption
Hashing
Digital Certificates
Authenticating the Certificate
Enter the PKI System
So What Is a Certification Authority?
Building a PKI Structure
After PKI Has Been Set Up
PKI in Action
Digital Signatures
We’ve Covered
Chapter 8: Steganography
Steganography Overview
Steganography: A Brief History
So Why Steganography?
How Does Steganography Work?
Steganography in Audio
Steganography in Video
Steganography in Documents
Null Ciphers
Steganography on Hard Drives
Steganalysis: Detecting Hidden Information
Other Methods
Tools in Use
We’ve Covered
Chapter 9: Applied Cryptography
Less Theory, More Practical
Secure Sockets Layer (SSL)
Digital Signatures
Hashes
Automated Teller Machines
Drive Encryption
We’ve Covered
Chapter 10: Quantum Cryptography
So What Is Quantum Cryptography?
Traditional Cryptography: A Quick Review
Finding a Solution via Quantum Mechanics
So How Does Quantum Cryptography Work?
Photons as Information Carriers
But What About Eavesdropping?
So There Have to Be Problems, Right?
We’ve Covered
Chapter 11: The Future of Cryptography
Where Are We Now?
Personal Data Requirements
What About the Law?
The Law and Encryption
Military, Government, and the Individual
Key Escrow
Embedded Cryptography
We’ve Covered
Glossary
Index
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Cryptography: InfoSec Pro Guide
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset