About the Author |
|
xvii | |
About the Technical Reviewers |
|
xix | |
Introduction |
|
xxi | |
|
Chapter 1 The First Era of Digital Encryption |
|
|
1 | (12) |
|
|
1 | (2) |
|
The Basics of Frequency Analysis |
|
|
3 | (2) |
|
The Wonders of Steganography |
|
|
5 | (1) |
|
European Developments in Cryptography |
|
|
6 | (2) |
|
At the End of Classical Cryptography |
|
|
7 | (1) |
|
The Digital Cryptographic Revolution |
|
|
8 | (4) |
|
|
8 | (1) |
|
The Diffie--Hellman Key Exchange |
|
|
9 | (2) |
|
The Data Encryption Standard (DES) |
|
|
11 | (1) |
|
|
12 | (1) |
|
Chapter 2 A Medium-Length History of Digital Cryptography |
|
|
13 | (12) |
|
RSA: The First Big Public-Key Cryptosystem |
|
|
13 | (6) |
|
|
15 | (1) |
|
Encrypting and Decrypting in RSA |
|
|
16 | (1) |
|
|
17 | (1) |
|
The Strengths and Weaknesses of RSA |
|
|
17 | (2) |
|
|
19 | (1) |
|
|
19 | (1) |
|
Public-Key Infrastructure (PKI) and Certificate Authorities (CA) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
21 | (1) |
|
FIPS and Digital Signature Algorithm (DSA) |
|
|
22 | (1) |
|
Have Some Standards for Goodness' Sake |
|
|
22 | (2) |
|
|
24 | (1) |
|
Chapter 3 The AES and Other Established Cryptographic Technologies |
|
|
25 | (28) |
|
|
25 | (1) |
|
|
26 | (5) |
|
Converting Decimal to Binary |
|
|
27 | (1) |
|
Converting Decimal to Hexadecimal |
|
|
28 | (1) |
|
Converting Binary to Hexadecimal (and Vice Versa) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (10) |
|
|
32 | (1) |
|
Block Sizes and Key Lengths |
|
|
33 | (1) |
|
The Substitution-Permutation Network (SPN) |
|
|
34 | (1) |
|
Row- and Column-Major Orders |
|
|
34 | (1) |
|
The Steps in an AES Encryption Round |
|
|
35 | (6) |
|
|
41 | (1) |
|
Hash Values: Digital Fingerprints and Checksums |
|
|
41 | (4) |
|
|
42 | (2) |
|
Secure Hash Algorithm 1 (SHA-1) |
|
|
44 | (1) |
|
Secure Hash Algorithm 2 (SHA-2) |
|
|
44 | (1) |
|
Secure Hash Algorithm 3 (SHA-3) |
|
|
44 | (1) |
|
|
45 | (1) |
|
Would You Like Some Salt with Your Data? |
|
|
45 | (3) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
Cyclic Redundancy Check (CRC) |
|
|
48 | (1) |
|
|
48 | (2) |
|
Block Ciphers and Stream Ciphers |
|
|
49 | (1) |
|
Electronic Code Book (ECB) |
|
|
49 | (1) |
|
Cipher Block Chaining (CBC) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
50 | (1) |
|
|
51 | (2) |
|
Chapter 4 You, Your Organization, and Cryptographic Security |
|
|
53 | (22) |
|
Storage Devices, Sectors, and Blocks |
|
|
53 | (2) |
|
The Wonders of File Systems |
|
|
55 | (2) |
|
|
57 | (1) |
|
Full-Disk Encryption (FDE) |
|
|
58 | (1) |
|
|
58 | (1) |
|
Pre-boot Authentication (PBA) |
|
|
58 | (1) |
|
Trusted Platform Module (TPM) |
|
|
59 | (1) |
|
Block Cipher Operating Modes |
|
|
59 | (1) |
|
Encryption in Modern Operating Systems |
|
|
60 | (1) |
|
Encryption in MacOS: FileVault and FileVault 2 |
|
|
61 | (1) |
|
|
62 | (2) |
|
Linux Unified Key Setup (LUKS) |
|
|
64 | (1) |
|
Third-Party Encryption Suites |
|
|
65 | (4) |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (4) |
|
|
73 | (2) |
|
Chapter 5 Common Attacks Against Cryptographic Systems |
|
|
75 | (28) |
|
Cryptographic Attack Models |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (1) |
|
Differential Cryptanalysis |
|
|
77 | (16) |
|
|
78 | (1) |
|
|
78 | (2) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
|
81 | (1) |
|
|
82 | (1) |
|
|
83 | (1) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
85 | (1) |
|
Side Channel Attack (SCA) |
|
|
86 | (5) |
|
Cyberthreats Not Specific to Cryptography |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
92 | (1) |
|
Man-in-the-Browser (MITB) |
|
|
93 | (1) |
|
Boy-in-the-Browser (BITB) |
|
|
93 | (1) |
|
|
93 | (8) |
|
Distributed Denial-of-Service (DDoS) Attack |
|
|
94 | (1) |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
101 | (2) |
|
Chapter 6 Creating Extremely Secure Encrypted Systems |
|
|
103 | (46) |
|
|
104 | (1) |
|
Small vs. Big Business Readiness |
|
|
105 | (1) |
|
A Refresher on Network Security |
|
|
106 | (18) |
|
|
107 | (9) |
|
|
116 | (1) |
|
Virtual Private Network (VPN) |
|
|
117 | (2) |
|
Setting Up a VPN for Windows |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
122 | (1) |
|
Safe Emailing with OpenPGP |
|
|
123 | (1) |
|
Draft Begone! Securing Windows |
|
|
124 | (6) |
|
|
125 | (1) |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
A Fresh Start: Resetting a TPM |
|
|
129 | (1) |
|
A Nice, Ripe Stick of USB, Please |
|
|
130 | (1) |
|
|
130 | (8) |
|
|
131 | (2) |
|
T2, Judgment Chip: TPM, Apple Style |
|
|
133 | (2) |
|
|
135 | (1) |
|
Security Software for Mac |
|
|
136 | (2) |
|
|
138 | (2) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (8) |
|
|
140 | (2) |
|
Avira Antivirus by Avira Operations GmbH & Co |
|
|
142 | (2) |
|
|
144 | (1) |
|
SpyBot -- Search and Destroy by Safer-Networking Ltd |
|
|
145 | (1) |
|
TDSS Killer and Virus Removal Tool 2015 by Kaspersky Lab |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (1) |
|
|
148 | (1) |
|
Chapter 7 Prohibitions and Legal Issues |
|
|
149 | (26) |
|
Missiles, Tanks, and Encryption |
|
|
150 | (1) |
|
EU's General Data Protection Regulation (GDPR) |
|
|
151 | (1) |
|
Cryptography in the United States |
|
|
152 | (1) |
|
Encrypted and Crossing the Border |
|
|
153 | (1) |
|
Key Disclosure Laws in the United States |
|
|
154 | (1) |
|
Key Disclosure Laws in Canada, Europe, and Oceania |
|
|
154 | (3) |
|
Key Disclosure Laws in Africa |
|
|
157 | (1) |
|
World's Toughest Key Disclosure Laws |
|
|
158 | (1) |
|
|
159 | (1) |
|
The Wassenaar Arrangement |
|
|
160 | (1) |
|
|
160 | (1) |
|
The Import of Cryptography |
|
|
161 | (4) |
|
Corporate Data Security Laws |
|
|
165 | (3) |
|
|
166 | (2) |
|
More on Privacy Laws in the United States |
|
|
168 | (1) |
|
|
169 | (1) |
|
State-Level Privacy Legislation |
|
|
169 | (2) |
|
A Primer on US Legal Terms |
|
|
171 | (2) |
|
|
173 | (2) |
|
Chapter 8 Quantum Computing: The Next Big Paradigm |
|
|
175 | (12) |
|
|
175 | (1) |
|
|
176 | (3) |
|
Six Ways Qubits Will Change Our World |
|
|
179 | (6) |
|
|
179 | (1) |
|
|
180 | (1) |
|
|
181 | (2) |
|
|
183 | (1) |
|
|
183 | (1) |
|
|
184 | (1) |
|
|
185 | (1) |
|
|
185 | (2) |
|
Chapter 9 The Rollicking World of Quantum Mechanics |
|
|
187 | (22) |
|
A Few Words on Classical Mechanics |
|
|
187 | (2) |
|
Introducing Modern Physics |
|
|
189 | (3) |
|
Atoms and Sub-atomic Particles |
|
|
191 | (1) |
|
Black Holes and Their Applications |
|
|
192 | (7) |
|
The Quiet Region and the Ergosphere |
|
|
194 | (1) |
|
The Event Horizon (No, Not the 1990s Movie) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (2) |
|
A Brief History of the Higgs Boson |
|
|
198 | (1) |
|
|
199 | (1) |
|
The Uncertainty Principle |
|
|
199 | (1) |
|
Double-Slit Experiments: The Wave-Particle Duality |
|
|
199 | (2) |
|
Waves, Phase, and Quantum Coherence/Decoherence |
|
|
201 | (1) |
|
The Planck Constant and Planck Units |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
And Now We Need to Talk About Cats |
|
|
206 | (1) |
|
|
206 | (1) |
|
|
207 | (2) |
|
Chapter 10 Quantum Information Science 101 |
|
|
209 | (18) |
|
|
209 | (3) |
|
Quantum Computer Says No: Error Correction |
|
|
212 | (3) |
|
Four Approaches to Quantum Computing |
|
|
215 | (1) |
|
I Quantum Gate Array (Quantum Circuit) |
|
|
215 | (2) |
|
|
217 | (1) |
|
Unitary and Permutation Matrices |
|
|
218 | (1) |
|
|
218 | (2) |
|
|
220 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
Toffoli and Fredkin Gates |
|
|
222 | (1) |
|
II The Topological Quantum Computer |
|
|
223 | (1) |
|
III The Adiabatic Quantum Computer (AQC) |
|
|
224 | (1) |
|
IV One-Way Quantum Computer |
|
|
225 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
Chapter 11 Quantum Cryptography |
|
|
227 | (8) |
|
On Quantum Key Distribution (QKD) |
|
|
227 | (1) |
|
|
228 | (1) |
|
|
228 | (3) |
|
|
231 | (1) |
|
The Six-State Protocol (SSP) |
|
|
231 | (1) |
|
|
232 | (1) |
|
Continuous-Variable (CV) Protocols |
|
|
232 | (1) |
|
Shor's (Factoring) Algorithm |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
Chapter 12 Quantum Key Distribution Under Attack |
|
|
235 | (12) |
|
|
235 | (1) |
|
Photon Number Splitting (PNS) |
|
|
236 | (1) |
|
|
237 | (1) |
|
|
237 | (1) |
|
Intercept and Resend (IR) |
|
|
237 | (1) |
|
|
238 | (1) |
|
|
238 | (2) |
|
|
240 | (1) |
|
|
240 | (1) |
|
Field Programmable Array Gate (FPGA) |
|
|
241 | (1) |
|
Optical Attenuator, Isolator, and Narrow Band Pass Filter |
|
|
242 | (1) |
|
Laser Diode, Intensity Modulator, and Phase Modulator |
|
|
242 | (1) |
|
Beam Splitter and Polarizing Beam Splitter |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
Electronic Polarization Controller |
|
|
243 | (1) |
|
|
243 | (1) |
|
Avalanche Photodiodes and Self-Differencing Circuits |
|
|
244 | (1) |
|
|
244 | (1) |
|
|
245 | (1) |
|
|
245 | (2) |
|
Chapter 13 Implementations of QKD |
|
|
247 | (10) |
|
The DARPA Quantum Network |
|
|
247 | (4) |
|
Secure Communication Based on Quantum Cryptography (SECOQC) |
|
|
248 | (3) |
|
Quantum Experiments at Space Scale (QUESS) |
|
|
251 | (1) |
|
|
252 | (1) |
|
|
253 | (2) |
|
|
255 | (1) |
|
|
256 | (1) |
|
Chapter 14 Post-Quantum Cryptography |
|
|
257 | (20) |
|
Post-Quantum Cryptography |
|
|
257 | (1) |
|
|
258 | (3) |
|
|
261 | (1) |
|
Multivariate Cryptography |
|
|
262 | (1) |
|
Lattice-Based Cryptography |
|
|
263 | (3) |
|
|
266 | (2) |
|
|
268 | (1) |
|
Video Gaming for Homomorphism |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
Zero-Knowledge Proof in PQC |
|
|
271 | (1) |
|
|
272 | (1) |
|
|
273 | (1) |
|
|
274 | (3) |
Index |
|
277 | |