Security for computer networks : An introduction to data security in teleprocessing and electronic funds transfer

by D. W. Davies

Other authorsW. L. Price (Author)
Hardcover, 1992

Status

Available

Call number

005.8

Library's review

Indeholder "Acronym List", "Preface to the First Edition", "Preface to the Second Edition", "Chapter 1. Data Security", " 1.1 The need for data security", " 1.2 Assessment of security", " Software integrity", " Security and people", " 1.3 The effects of technology", " 1.4 The notation for
Show More
encipherment", " The need for key distribution and management", " 1.5 Some uses for encipherment", " 1.6 General properties of cipher functions", "Chapter 2. Ciphers and Their Properties", " 2.1 Introduction", " 2.2 Substitution ciphers", " The Caesar cipher", " Monoalphabetic substitution", " Polyalphabetic substitution", " The Vigenere cipher", " 2.3 Transposition ciphers", " Simple transposition", " The Nihilist cipher", " 2.4 Product ciphers", " 2.5 Cipher machines", " The Jefferson cylinder", " The Wheatstone disc", " Rotor machines, the Enigma", " Printing cipher machines", " Modern cipher machines", " Substitution in modern ciphers", " Keyed substitution", " Transposition in modern ciphers", " 2.6 Attacks against enciphered data", " Classes of attack", " 2.7 The stream cipher", " The Vernam cipher", " Pseudo-random key streams", " 2.8 The block cipher", " 2.9 Measurement of cipher strength", " Shannon's theory of secrecy systems", " Limits of computation", " An application of Shannon's theory", " 2.10 Threats against a secure system", " Active line taps", " Methods of protection", " 2.11 The encipherment key", " References", "Chapter 3. The Data Encryption Standard", " 3.1 History of the DES", " The role of NBS", " The IBM Lucifer cipher", " The process of establishing the DES", " 3.2. The algorithm of the Data Encryption Standard", " The ladder diagram", " An algebraic representation", " 3.3 The effect of the DES algorithm on data", " 3.4 Known regularities in the DES algorithm", " Complementation", " The weak keys", " The semi-weak keys", " Hamiltonian cycles in the DES", " 3.5 Argument over the security of the DES", " Exhaustive search for a DES key", " Multiple DES encipherment", " Trapdoors in the DES?", " Senate investigation of the DES", " 3.6 Recent academic studies of the DES and its properties", " 3.7 Implementations of the Data Encryption Standard", " 3.8 The IBM cryptographic scheme", " 3.9 Current status of the DES", " References", "Chapter 4. Using a Block Cipher in Practice", " 4.1 Methods for using a block cipher", " The limitations of the electronic codebook mode", " 4.2 Cipher block chaining", " The first and last blocks", " Transmission errors in CBC encipherment", " Choice of the initializing variable", " 4.3 Cipher feedback", " Error extension in cipher feedback", " Initializing with CFB", " Encipherment of an arbitrary character set", " 4.4 Output feedback", " Key stream repetition", " 4.5 Standard and non-standard methods of operation", " 4.6 Security services in Open Systems Interconnection", " Definition of security services", " Security services in relation to the OSI layers", " 4.7 The place of encipherment in network architecture", " Link-by-link encipherment", " End-to-end encipherment", " The key distribution problem for end-to-end encipherment", " Node-by-node encipherment", " A best place for encipherment in network architecture?", " References", "Chapter 5. Authentication and Integrity", " 5.1 Introduction", " 5.2 Protection against errors in data preparation", " 5.3 Protection against accidental errors in data transmission", " Cyclic redundancy checks", " 5.4 Data integrity using secret parameters", " 5.5 Requirements of an authenticator algorithm", " The Decimal Shift and Add algorithm", " Message Authenticator Algorithm (MAA)", " Authentication methods using the standard 'modes of operation'", " 5.6 Message integrity by encipherment", " Choice of the plaintext sum check method for authentication", " Encipherment or authentication?", " Authentication without a secret key", " 5.7 The problem of replay", " Use of a message sequence number", " The use of random numbers for entity authentication", " The use of date and time stamps", " Integrity of stored data", " 5.8 The problem of disputes", " References", "Chapter 6. Key Management", " 6.1 Introduction", " 6.2 Key generation", " Random bit generators", " Pseudo-random number generators", " 6.3 Terminal and session keys", " Routes for distribution of session keys", " Session key distribution protocol", " Authentication at the key acquisition phase", " Authentication at the key transfer phase", " Distribution of terminal keys", " 6.4 The IBM key management scheme", " Physical security requirements", " The key hierarchy", " The encipherment and decipherment of data at the host", " Generation and distribution of a session key", " Generation and distribution of the terminal key", " The principles of file security in the IBM key management scheme", " Generating and retrieving a file key", " Transfer of enciphered data between hosts", " Transfer of enciphered files between hosts", " 6.5 Key management with tagged keys", " Generation of new tagged keys", " Extending the key hierarchy", " 6.6 Key management standard for wholesale banking", " The key hierarchy", " Encipherment and decipherment with double length keys", " Key distribution environments and messages", " Point-to-point distribution of keys", " Key distribution centre", " Key translation centre", " Consecutive use of two key translation centres", " Key notarization and offset", " 6.7 Alternatives for key management", " References", "Chapter 7. Identity Verification", " 7.1 Introduction", " 7.2 Identity verification by something known", " Passwords", " Variable passwords based on a one-way function", " Questionnaires", " 7.3 Identity verification by a token", " Magnetic stripe cards", " Watermark tape", " Sandwich tape", " Active cards", " Authentication by calculator", " 7.4 Identity verification by personal characteristics", " Machine recognition", " System tolerance", " 7.5 Handwritten signature verification", " Techniques for recording pen movement", " Use of signature verification", " 7.6 Fingerprint verification", " Machine recognition of fingerprints", " 7.7 Voice verification", " 7.8 Recognition of retinal patterns", " 7.9 The verification process", " Introduction", " Verification", " Tradeoffs", " 7.10. Assessment of identity verification techniques", " The Mitre evaluation studies", " Voice", " Signature", " Fingerprints", " Comparison of systems", " 7.11 Performance of other identity verification devices", " Speaker verification", " Signature verification", " Fingerprint verification", " Retinal patterns", " Profile verification", " 7.12 Selection of an identity verification system", " References", "Chapter 8. Public Key Ciphers", " 8.1 The principle of public key encipherment", " Access control with an asymmetric cipher", " Constructing a public key system", " One-way functions revisited", " Number theory and finite arithmetic", " 8.2 The exponential function and key distribution", " The exponential as a one-way function", " The complexity of the logarithm", " Key distribution", " Authentication and transparency", " 8.3 The power function", " Encipherment without key transport", " 8.4 The Rivest, Shamir and Adleman public key cipher", " An attack by iteration and a defence", " Practical aspects of the RSA cipher", " 8.5 The trapdoor knapsack", " Practical aspects of the trapdoor knapsack", " 8.6 A cipher based on error-correcting codes", " 8.7 The registry of public keys", " 8.8 Complexity theory and cryptography", " The limitations of complexity theory for cryptography", " 8.9 Appendix: Finite arithmetic", " Counting in modulo m arithmetic", " Addition", " Subtraction", " Multiplication", " Division", " The Euclidean algorithm", " Calculation of the reciprocal", " References", "Chapter 9. Digital Signatures", " 9.1 The problem of disputes", " 9.2 Digital signature using a public key cipher", " Signature and encipherment combined", " Signature using the RSA cipher", " The asymmetric use of DES as a signature substitute", " 9.3 Separation of the signature from the message", " Falsifying a signed message by the 'Birthday' method", " A one-way function for signature or authentication", " 9.4 The Fiat-Shamir protocols for identification and signature", " Mathematical basis of Fiat-Shamir protocols", " The basic identification scheme", " Fiat-Shamir signature scheme", " 9.5 Signatures employing a symmetric cipher", " Rabin's signature method", " Arbitrated signatures", " 9.6 The practical application of digital signatures", " Revocation of signatures", " 9.7 Appendix: The Birthday problem", " References", "Chapter 10. Electronic Funds Transfer and the Intelligent Token", " 10.1 Introduction", " 10.2 Established payment mechanisms", " The bank cheque", " Credit transfer", " Summary of the properties of payment methods", " 10.3 Inter-bank payments", " The Society for Worldwide Inter-bank Financial Telecommunication S.C.", " Message format standards", " Security in the S.W.I.F.T. system", " The Clearing Houses Automated Payments System", " 10.4 Automatic teller machines", " On-line and off-line operation", " PIN management", " Algorithmic PIN checking", " The dialogue for an on-line ATM", " Shared ATM systems", " Checking the PIN with an authentication parameter", " Public key cryptography in a shared ATM system", " 10.5 Point-of-sale payments", " The transaction key method", " Derived unique key per transaction method", " An improvement to the derived key method", " EFT-POS with public key cryptography", " Off-line point-of-sale terminals and smart cards", " Physical security requirements of the intelligent token", " PIN checking in an intelligent token", " 10.6 Payments by signed messages", " Point-of-sale payments by electronic cheque", " A development of the intelligent token", " 10.7 Access control by intelligent tokens", " Access control for centralized and distributed information services", " 10.8 Negotiable documents", " A general-purpose negotiable document", " Protection of negotiable documents against theft", " References", "Chapter 11. Data Security Standards", " 11.1 Introduction", " The standards authorities", " 11.2 Standardization related to the Data Encryption Standard", " Federal Standard 1027 — General security requirements for equipment using the DES", " A register of cryptographic algorithms", " 11.3 Modes of operation", " 11.4 Encipherment in the physical layer of data communications", " Principles for encipherment at the physical layer", " Signalling the start of transmission", " Treatment of the break signal", " The option of bypass control", " Characteristics of encipherment in the physical layer", " 11.5 Peer entity authentication", " 11.6 Standards for data security in banking", " 11.7 Postscript", " References", "Glossary", "Index".

Fornuftig gennemgang af kryptering og praktisk brug af kryptosystemer. Bogen er fra ca 1990, så i skrivende stund er den 30 år gammel og der er fx ikke et ord om webservere. Så den er mest af historisk interesse.
Show Less

Publication

Chichester : Wiley, 1992.

Description

How to use cryptography to protect data in teleprocessing systems--not only keeping data secret but also authenticating it, preventing alteration, and proving its origin. Approach is pragmatic--principles are illustrated with examples. Describes ciphers, the Data Encryption Standard, ways to use the ciphers, cipher key management schemes, public key ciphers, and how to apply data security measures to electronic funds transfer and teleprocessing.

Language

Original language

English

Physical description

377 p.; 25.1 cm

ISBN

0471921378 / 9780471921370

Local notes

Omslag: Ikke angivet
Omslaget viser titel og forfattere og et elektronisk kredsløb
Indskannet omslag - N650U - 150 dpi

Pages

377

Library's rating

Rating

½ (2 ratings; 4.5)

DDC/MDS

005.8
Page: 0.1972 seconds