Home Page Icon
Home Page
Table of Contents for
Modern Cryptography for Cybersecurity Professionals
Close
Modern Cryptography for Cybersecurity Professionals
by
Modern Cryptography for Cybersecurity Professionals
Modern Cryptography for Cybersecurity Professionals
Contributors
About the author
About the reviewer
Preface
Who this book is for
What this book covers
To get the most out of this book
Download the color images
Conventions used
Get in touch
Reviews
Section 1: Securing Our Data
Chapter 1: Protecting Data in Motion or at Rest
Outlining the current threat landscape
Digitally transforming our world
Threatening the security of our data
Understanding security services
Investigating X.800
Introducing common cryptographic concepts
Trusting a TTP
Managing keys using the PKI
Getting to know Bob and Alice
Outlining substitution and transposition
Substituting characters
Transposing the text
Breaking the code
Summary
Questions
Further reading
Chapter 2: The Evolution of Ciphers
Early uses of cryptography
Using tattoos and scytales
Evaluating monoalphabetic ciphers
Recognizing polyalphabetic ciphers
Encoding transmissions during war
Communicating during wartime
Examining the Enigma machine
Entering the digital age
Innovating in the field of computing
Developing the early ciphers
Summary
Questions
Further reading
Chapter 3: Evaluating Network Attacks
Comparing passive and active attacks
Carrying out a passive attack
Launching an active attack
Protecting sensitive data
Understanding attack vectors
Providing defense mechanisms
Maintaining integrity
Protecting assets
Managing risk
Summary
Questions
Further reading
Section 2: Understanding Cryptographic Techniques
Chapter 4: Introducing Symmetric Encryption
Discovering the evolution of symmetric encryption
Protecting customer data
Developing the Feistel cipher
Creating the Lucifer cipher
Outlining symmetric algorithms
Understanding symmetric encryption
Describing the Data Encryption Standard
Illustrating the Advanced Encryption Standard
Identifying other symmetric algorithms
Scheduling the keys
Dissecting block and stream ciphers
Using a block cipher
Generating a stream
Comparing symmetric encryption operation modes
Using ECB
Adding feedback
Applying CTR mode
Securing wireless communications
Preventing eavesdropping
Comparing protocols
Summary
Questions
Further reading
Chapter 5: Dissecting Asymmetric Encryption
Realizing the need for asymmetric encryption
Securely exchanging a key
Outlining the PKCS
Understanding cryptographic requirements
Designing a strong algorithm
Generating a key pair
Managing keys
Using asymmetric encryption
Comparing public-key algorithms
Outlining RSA
Visualizing an elliptical curve
Providing PGP
Trusting public keys
Working with digital signatures
Providing core security services
Creating a digital signature
Summary
Questions
Further reading
Chapter 6: Examining Hash Algorithms
Describing a hash algorithm
Creating a hash
Employing a hash function
Identifying optimal hash properties
Generating a one-way function
Producing a fixed-size output
Consistently creating the same hash
Ensuring collision resistance
Comparing common hash algorithms
Using the message digest algorithm
Exploring the Secure Hash Algorithm (SHA)
Recognizing other hash algorithms
Authenticating a message
Creating a MAC
Encrypting and authenticating data
Summary
Questions
Further reading
Section 3: Applying Cryptography in Today's World
Chapter 7: Adhering to Standards
Understanding FIPS and PCI DSS
Outlining FIPS
Outlining PCI DSS
Staying compliant
Ensuring the privacy of patient data
Giving consumers control of their data
Enforcing protection in California
Leveraging encrypted data
Securing our data
Concealing malware
Holding files ransom
Exposing private information
Summary
Questions
Further reading
Chapter 8: Using a Public Key Infrastructure
Describing a PKI framework
Understanding how a PKI assures trust
Exchanging the keys
Understanding the components
Storing certificates
Revoking a certificate
Managing public keys
Creating a certificate
Trusting the root
Spoofing the process
Examining a certificate
Viewing a certificate
Recognizing the X.509 standard
Validating a certificate
Using certificates
Summary
Questions
Further reading
Chapter 9: Exploring IPsec and TLS
Using a VPN
Securing traffic using OpenVPN
Choosing a browser-based VPN
Using an SSH VPN
Using a VPN on a Windows machine
Outlining an IPsec VPN
Grasping the IPsec framework
Dissecting the AH protocol
Encapsulating the security payloads
Using operating modes
Generating a shared secret key with DH
Managing the keys using IKE
Setting up an IPsec profile
Understanding TLS
Understanding the handshake protocols
Dissecting the Record protocol
Summary
Questions
Further reading
Chapter 10: Protecting Cryptographic Techniques
Recognizing cryptographic attacks
Comparing various attacks
Using Kali Linux
Cracking WEP
Attacking the infrastructure
Guaranteeing trust
Violating trust
Influence of quantum computing
Describing quantum computing
Implementing quantum-resistant algorithms
Summary
Questions
Further reading
Assessments
Chapter 1 – Protecting Data in Motion or at Rest
Chapter 2 – The Evolution of Ciphers
Chapter 3 – Evaluating Network Attacks
Chapter 4 – Introducing Symmetric Encryption
Chapter 5 – Dissecting Asymmetric Encryption
Chapter 6 – Examining Hash Algorithms
Chapter 7 – Adhering to Standards
Chapter 8 – Using a Public Key Infrastructure
Chapter 9 – Exploring IPsec and TLS
Chapter 10 – Protecting Cryptographic Techniques
Why subscribe?
Other Books You May Enjoy
Packt is searching for authors like you
Leave a review - let other readers know what you think
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Modern Cryptography for Cybersecurity Professionals
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset